Security & Compliance at Kakoo

We keep your data private, safe and accessible all the time.
Your data security is our top priority. We meet the highest worldwide security standards and practice robust processes and policies to ensure data confidentiality, integrity, and availability. Along with periodic audits and continuous monitoring, we put our software through various tests internally. It allows us to identify potential security risks early, address them quickly, and stay ahead of new threats. Here’s what we do to keep your data safe.

Encryption in Transit

Every communication with our server undergoes encryption using industry-standard 128-bit SSL/TLS encryption, guaranteeing the safety and security of your data as it travels to and from our application servers.

Data Encryption

To maintain confidentiality, all sensitive data is encrypted at rest using the Advanced Encryption Standard (AES). Passwords are never stored in plain text; instead, they undergo hashing for enhanced security.

Secure Infrastructure

Kakoo's computing infrastructure is hosted on AWS, a trusted and secure cloud services platform. AWS's physical infrastructure adheres to ISO 27001 and SOC 2 compliance standards, ensuring the highest levels of security and reliability.

Application

Kakoo's security policy is designed to safeguard sensitive data, including information that is collected, processed, stored, and transmitted by our software.

Access Control

Accessing our production infrastructure goes beyond a mere password; authorized personnel must undergo a multi-step authentication process. This stringent protocol ensures that only individuals with appropriate clearance can access sensitive customer data. Moreover, we restrict data access to only the information necessary for providing support and troubleshooting on behalf of the customer.

Application Access

Recruit CRM employs a Role-Based Access-Control (RBAC) system to safeguard all data access, ensuring that only authorized users can retrieve information. Users are restricted from viewing data belonging to organizations other than their own, maintaining strict data privacy and security measures.

Vulnerability Scanning & Patching

We regularly inspect and apply patches for third-party software and services to maintain system security. In the event of discovered vulnerabilities, we promptly deploy fixes within predefined Service Level Agreements (SLAs), ensuring robust protection against potential threats.

Penetration Testing

We enlist the services of independent, qualified third-party VAPT (Vulnerability Assessment and Penetration Testing) providers to perform regular penetration tests. These tests help uncover potential vulnerabilities and ensure the ongoing security of our systems.

Security Training

All personnel at Kakoo are required to undergo security training tailored for a cloud-hosted environment. This comprehensive training encompasses industry best practices regarding common human-based attack vectors, including phishing, password security, handling attachments, and more.

Disclosure

Ensuring the security of our system is paramount to us. If you come across any potential security concerns, please promptly report them to us at demo@kakoo-software.com. Rest assured, we will address them with the highest priority.

Our high-security standards are reflected in ISO 27001 & SOC 2 and will only enhance our continued compliance, internally and for our customers, as we develop new features.