Security at TheySaid
Security embedded into our system
Security is built into the fabric of our cloud products, infrastructure, and processes, so you can rest assured that your data is safeguarded.
Google trusts only 67 companies with sensitive access to OAuth, and TheySaid is one of those companies. TheySaid uses enterprise-grade security and regular audits to ensure you’re always protected. We undergo regular penetration testing and security reviews designed to be SOC 2 and ISO 27001 compliant. This commitment to security is ingrained in our culture.
Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES.
Independent third-party penetration, threat, and vulnerability testing.
User access controls with single sign on.
TheySaid’s cloud environments are backed by Google Cloud’s security measures.
Role-based account access workflows.
Continuous Security Commitment
We perform an independent third-party penetration test at least annually to ensure that the security posture of our services is uncompromised.
Security Awareness Training
Our team must undergo employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Our organization undergoes independent third-party assessments to test our security controls.
Roles and Responsibilities
Roles and responsibilities related to our information security program and customer data protection are well-defined and documented.
Information Security Program
We have an information security program in place that is communicated throughout the organization. Our information security program follows the criteria set forth by SOC 2).
We continuously monitor our security and compliance status to ensure no lapses.