Cyblink Security Statement

Last updated: January 2025

At Cyblink, security is foundational. This statement outlines how we protect data, safeguard platform integrity, and continuously improve our defenses across www.cyblink.ai.

Data Protection & Encryption

  • Encryption in transit & at rest: TLS 1.3 for all transport; AES-256 for stored data.
  • Hardened cloud infrastructure: Hosted on enterprise-grade cloud with strong physical and logical controls.
  • Access controls: Multi-factor authentication (MFA) for all administrative access.
  • Data isolation: Customer data is logically segregated with strict, role-based access.

Monitoring & Incident Handling

  • Continuous monitoring: Automated alerting, health checks, and anomaly detection across key services and logs.
  • Incident response playbooks: Defined procedures for triage, containment, remediation, and post-incident review.
  • Security testing: Periodic vulnerability assessments and targeted penetration testing.
  • Monitoring and response are handled via automated controls and on-call engineering procedures.

Compliance & Certifications

  • Security standards: We align with recognized security standards and are actively implementing an ISMS in accordance with ISO/IEC 27001:2022 in preparation for certification.
  • Privacy compliance: We also design and operate controls to support applicable privacy obligations (e.g., GDPR, CCPA), including data-subject rights processes and contractual DPAs where required.

Platform Security Features

  • Secure file handling: All uploads are scanned for malware and stored securely.
  • Role-based access control (RBAC): Granular permissions ensure least-privilege access.
  • Audit logging: Comprehensive logging of user and system activities.
  • Encrypted communications: All in-platform messaging and data exchanges are encrypted.

Third-Party Security

  • Vendor due diligence: Third-party providers are assessed for security posture and contractual data-protection commitments.
  • Secure integrations: All integrations use authenticated, encrypted APIs and minimum required scopes.

Shared Responsibility

  • Strong credentials: Use unique, complex passwords and enable MFA.
  • Secure endpoints: Keep devices patched and protected with endpoint security.
  • Report issues: Immediately notify us of any suspicious activity or potential vulnerabilities.

Transparency & Updates

  • Security updates: We continuously enhance controls and will communicate material improvements.
  • Incident notifications: We will promptly inform affected customers of any incident with potential impact.
  • Best practices: We share relevant security guidance to help customers use Cyblink securely.

Contact Our Security Team

Contact our security team: security@cyblink.ai

Last updated: January 2025