Security White Paper

Effective Date: September 12, 2023

Table of Contents

  • Overview
  • Why Should You Be Concerned About Cybersecurity?
  • Cyber Security Terms To Know
  • Cybersecurity Best Practices: How we Secure Your Data
  • Sources

Overview

Thread's Security and Privacy teams establish and enforce policies, monitor compliance, and undergo third-party audits to demonstrate our commitment to security and privacy.


With our background in Large Scale Enterprise, we prioritize the highest security standards for your sensitive incident data.

Why Should You Be Concerned About Cybersecurity?

As of August 2023, over 690 million records were exposed in data breaches in the first half of 2023. (Ford, 2023) Furthermore, according to a recent study, hackers attack every 39 seconds, amounting to 2,244 attacks per day on average.

Your incident data represents some of the most sensitive information that your company has, and we take that very seriously as an enterprise solution.

Cyber Security Terms To Know:

Authentication

  • Authentication is the process of confirming your identity.
  • Your passwords verify that you are the person who should have the username in question.
  • The fact that your photo looks like you when you show your ID (e.g., driver's license) is a way of validating that the name, age, and address on the ID correspond to you.
  • Backup

    The process of copying essential data to a secure location, such as a cloud storage system or an external hard drive, is referred to as a backup. Backups allow you to restore your systems to a working state in the event of a cyber attack or a system failure.

    Breach of Personal Information:

    A data breach occurs when a hacker acquires unauthorized access to data belonging to an organization or an individual.

    Encryption:

    Encryption is the process of converting data into a secure and unreadable format to protect it from unauthorized access or interception.

    Cybersecurity Best Practices: How we Secure Your Data

    Cybersecurity isn't a simple two-step or three-step process. A combination of best practices and defensive cybersecurity approaches is used to protect your data.

    Word Class Device Management

    The first line of attack is often times a company's devices themselves, and we are pleased to say that we have invested in a world class device management solution for our devices.

    Firewall

    Your knowledge base and incident information from is shielded from direct access by world class firewall provisioning. The only way to access this information is through your Thread User account.

    Encryption

    We employ Military-Grade 256-bit AES encryption to safeguard sensitive information such as passwords and user data stored on our systems.

    2FA

    We offer two-factor authentication (2FA) at all price points during onboarding, ensuring the use of both a username or PIN and an external device or account like email or phone number for enhanced security, a feature not universally provided by our competitors.

    Sources


    Ford, N. (2023). List of data breaches and cyber attacks in 2023. IT Governance UK Blog. https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2023#july-2023

    Here is a link to our Security White Paper