Lexington, KY - January 19, 2022
PhishingBox, an industry leader in phishing simulation and training, announced today that it has successfully completed the SOC 2 Type 2 audit, which was conducted by MCM CPAs & Advisors LLP. The System Organization Control (SOC) is a reporting framework created by the American Institute of Certified Public Accountants (AICPA) that sets standards for managing customer and user data.
PhishingBox’s SOC 2 report validates the existence of internal controls that have been created and executed to meet the requirements for the security principles set forth in the Trust Services Principles and Criteria for Security. For customers in highly regulated industries, the verification of these security controls is paramount.
PhishingBox is a company focused on security. Being a security solutions provider, PhishingBox understands the security concerns of our clients, partners and resellers. As a key component in security training programs worldwide, PhishingBox handles client information with care. We provide a suite of security tools to minimize the threat from phishing. We accomplish this using phishing simulations, security awareness training, and threat protection tools. PhishingBox is headquartered in Lexington, Kentucky and serves clients worldwide. We maintain a robust security posture and have data centers in the U.S. and overseas, including the European Union. Our operations are reviewed by independent auditors at least annually.
PhishingBox is a security awareness training and phishing simulation provider. Using PhishingBox’s integrated suite of software and tools, any organization can implement a robust security awareness training and testing program. The suite of tools provided by PhishingBox include training content, learning management system, phishing simulator and various reporting and management tools.
Running simulated phishing tests will determine your employees' susceptibility to social engineering and phishing scams. Train your employees and help them identify spear phishing and ransomware attacks.