Phished

Overview

At Phished, we're deeply committed to maintaining robust and comprehensive security measures. We believe that keeping our systems, and by extension your data, secure is of paramount importance. We don't just comply with the industry standard for data protection, we strive to exceed it.

This Security Page provides an overview of our stringent internal security program. It gives you an insight into our dedication to consistently uphold the highest levels of data security. On this page, you can request access to our audit reports and security policies for a detailed review.

If you have any questions about our security program, please review our Security Overview which is available below.

Compliance

SOC II
SOC II

SOC2, or Service Organization Control 2, is a standard developed by the American Institute of CPAs (AICPA). It's designed to assure that service providers manage and secure customer data to protect its privacy and confidentiality. The SOC2 reports focus on five trust service principles: security, availability, processing integrity, confidentiality, and privacy.

ISO 27001
ISO 27001

ISO27001 is an international standard issued by the International Organization for Standardization (ISO) that provides a framework for information security management systems (ISMS). It helps organizations manage and protect their information assets by addressing people, processes, and technology. The standard encompasses risk management processes, policies, and audits, and ensures the confidentiality, integrity, and availability of information.

Certified: Until September 2027

GDPR
GDPR

The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union (EU) to protect the privacy and personal data of its citizens. It applies to all EU member states and any organizations worldwide that process personal data of EU citizens. The regulation emphasizes transparency, security and accountability by data controllers, while giving individuals greater control over their personal data, including rights to access, correct, delete, and transfer their information.

NIS2 Directive
NIS2 Directive

The NIS2 Directive establishes a unified legal framework to uphold cybersecurity in 18 critical sectors across the EU. It also calls on Member States to define national cybersecurity strategies and collaborate with the EU for cross-border reaction and enforcement

Cloud Security
Cloud Security

The Security, Trust, Assurance, and Risk (STAR) Registry is a publicly accessible registry that documents the security and privacy controls provided by popular cloud computing offerings. STAR encompasses the key principles of transparency, rigorous auditing, and harmonization of standards outlined in the Cloud Controls Matrix (CCM). Publishing to the registry allows organizations to show current and potential customers their security and compliance posture, including the regulations, standards, and frameworks they adhere to. It ultimately reduces complexity and helps alleviate the need to fill out multiple customer questionnaires.

Visit
Cyber Essentials
Cyber Essentials

Cyber Essentials is a UK government-backed scheme that helps businesses protect themselves against the most common cyber threats. It's a self-assessment certification that focuses on five key areas: firewalls, secure configuration, access control, malware protection, and patch management.

Certified: March 2024

NIST Framework
NIST Framework

The NIST Cybersecurity Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. It provides a flexible approach to cybersecurity that can be tailored to the specific needs of different organizations, regardless of their size or industry. The framework consists of five core functions: Identify, Protect, Detect, Respond, and Recover.

DORA
DORA

DORA sets uniform requirements for the security of network and information systems of companies and organisations operating in the financial sector as well as critical third parties which provide ICT (Information Communication Technologies)-related services to them, such as cloud platforms or data analytics services.

Company

Risk profile

Data access level Restricted
Impact Severe
Recovery time objective < 4 hours

Legal

Cyber insurance
Data Processing Agreement

Corporate Security

Security awareness
Incident Response
Role-based access control

Policies

Information Security Policy
Access Control Policy
Asset Management Policy

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management

Security overview

Product

Security

Industry-grade encryption (in transit and at rest)
Audit logging
SSO (SAMLv2) compatible

Infrastructure

Google Cloud Platform
Validated disaster recovery plan
Enterprise-grade Web Application Firewall (WAF)

Access control

Role-based access control
Multi-factor authentication
Password security

If you think you may have discovered a vulnerability, please send us a note

Report issue