We understand that you put a lot of trust into your vendors. At PhishingBox, we are serious about security. Our business is built on security. As such, we have implemented security and privacy controls to provide a safe and secure application. Controls have been implemented to minimize the risk to the confidentiality, integrity, and availability of the system. Controls generally fall into one of the following categories: physical, technical, or administrative.
To help with your vendor due diligence process, we are including a summary of security and privacy information here. If you need additional information, please contact us directly.
As a trusted vendor, we understand your need to maintain a secure environment. Our security summary highlights many of our key security controls. Our information security program is an ongoing process. We have developed controls and these controls are audited or tested on a regular basis.
U.S. President Ronald Regan said, “Trust but verify”. So, you do not have to take our word for it as we have external audits conducted. Annually, we have a third-party audit firm conduct a SOC audit. A SOC report is an independent review from a CPA firm on the controls at a Service Organization relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy. These reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization.
Many of our clients are required to comply with the General Data Protection Regulations (GDPR). Our GDPR preparations have included a comprehensive review of relevant internal processes, procedures and documentation. Additionally, we have and continue to actively develop and implement data protection policies, procedures, controls and security measures for GDPR compliance. You can learn more about our GDPR compliance here.
The Cloud Security Alliance (CSA) is a global organization that outlines best practices for secure cloud computing. The CSA has developed standardized security practices and questionnaires to help streamline vendor due diligence for software as a service vendors. PhishingBox has adopted these practices to provide a standardized response to most vendor due diligence questions. Visit the CSA STAR program.
In today’s environment, privacy is a concern for all organizations. PhishingBox does not sell or share your information with unrelated third parties. We only use the information necessary to deliver the products and services to our clients and market to prospective clients. Our complete privacy policy is available here. The policy outlines how we handle information related to website visitors, clients of our system, and the contacts within our clients’ accounts. If you have any other privacy related questions, please contact us at privacy@phishingbox.com.
No, we are not hungry. Cookies are small pieces of text sent by your web browser by a website you visit. We use cookies to ensure that we are delivering the best possible experience for our visitors and customers. You can find more information on our cookie policy here.