Security White Paper
Effective Date: September 12, 2023
Table of Contents
- Overview
- Why Should You Be Concerned About Cybersecurity?
- Cyber Security Terms To Know
- Cybersecurity Best Practices: How we Secure Your Data
- Sources
Overview
Thread's Security and Privacy teams establish and enforce policies, monitor compliance, and undergo third-party audits to demonstrate our commitment to security and privacy.
With our background in Large Scale Enterprise, we prioritize the highest security standards for your sensitive incident data.
Why Should You Be Concerned About Cybersecurity?
As of August 2023, over 690 million records were exposed in data breaches in the first half of 2023. (Ford, 2023) Furthermore, according to a recent study, hackers attack every 39 seconds, amounting to 2,244 attacks per day on average.
Your incident data represents some of the most sensitive information that your company has, and we take that very seriously as an enterprise solution.
Cyber Security Terms To Know:
Authentication
Backup
The process of copying essential data to a secure location, such as a cloud storage system or an external hard drive, is referred to as a backup. Backups allow you to restore your systems to a working state in the event of a cyber attack or a system failure.
Breach of Personal Information:
A data breach occurs when a hacker acquires unauthorized access to data belonging to an organization or an individual.
Encryption:
Encryption is the process of converting data into a secure and unreadable format to protect it from unauthorized access or interception.
Cybersecurity Best Practices: How we Secure Your Data
Cybersecurity isn't a simple two-step or three-step process. A combination of best practices and defensive cybersecurity approaches is used to protect your data.
Word Class Device Management
The first line of attack is often times a company's devices themselves, and we are pleased to say that we have invested in a world class device management solution for our devices.
Firewall
Your knowledge base and incident information from is shielded from direct access by world class firewall provisioning. The only way to access this information is through your Thread User account.
Encryption
We employ Military-Grade 256-bit AES encryption to safeguard sensitive information such as passwords and user data stored on our systems.
2FA
We offer two-factor authentication (2FA) at all price points during onboarding, ensuring the use of both a username or PIN and an external device or account like email or phone number for enhanced security, a feature not universally provided by our competitors.
Sources
Ford, N. (2023). List of data breaches and cyber attacks in 2023. IT Governance UK Blog. https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2023#july-2023
Here is a link to our Security White Paper