Security & Compliance at Kakoo
Encryption in Transit
Every communication with our server undergoes encryption using industry-standard 128-bit SSL/TLS encryption, guaranteeing the safety and security of your data as it travels to and from our application servers.
Data Encryption
To maintain confidentiality, all sensitive data is encrypted at rest using the Advanced Encryption Standard (AES). Passwords are never stored in plain text; instead, they undergo hashing for enhanced security.
Secure Infrastructure
Kakoo's computing infrastructure is hosted on AWS, a trusted and secure cloud services platform. AWS's physical infrastructure adheres to ISO 27001 and SOC 2 compliance standards, ensuring the highest levels of security and reliability.
Application
Kakoo's security policy is designed to safeguard sensitive data, including information that is collected, processed, stored, and transmitted by our software.
Access Control
Accessing our production infrastructure goes beyond a mere password; authorized personnel must undergo a multi-step authentication process. This stringent protocol ensures that only individuals with appropriate clearance can access sensitive customer data. Moreover, we restrict data access to only the information necessary for providing support and troubleshooting on behalf of the customer.
Application Access
Recruit CRM employs a Role-Based Access-Control (RBAC) system to safeguard all data access, ensuring that only authorized users can retrieve information. Users are restricted from viewing data belonging to organizations other than their own, maintaining strict data privacy and security measures.
Vulnerability Scanning & Patching
We regularly inspect and apply patches for third-party software and services to maintain system security. In the event of discovered vulnerabilities, we promptly deploy fixes within predefined Service Level Agreements (SLAs), ensuring robust protection against potential threats.
Penetration Testing
We enlist the services of independent, qualified third-party VAPT (Vulnerability Assessment and Penetration Testing) providers to perform regular penetration tests. These tests help uncover potential vulnerabilities and ensure the ongoing security of our systems.
Security Training
All personnel at Kakoo are required to undergo security training tailored for a cloud-hosted environment. This comprehensive training encompasses industry best practices regarding common human-based attack vectors, including phishing, password security, handling attachments, and more.
Disclosure
Ensuring the security of our system is paramount to us. If you come across any potential security concerns, please promptly report them to us at demo@kakoo-software.com. Rest assured, we will address them with the highest priority.