top of page

Security Measures

Learn how we keep your data secure


At Goldphish, we are committed to protecting the confidentiality, integrity, and availability of our information systems and our customers' data. We continuously improve our security controls and analyse their effectiveness to ensure confidence in our solution.


Below is an overview of some of the security controls in place to protect your data.

Homepage Header-01.png

Data Centre Physical Security


Facilities
Goldphish uses IONOS for data centre hosting. IONOS data centres are certified as ISO 27001 compliant by the Technical Inspection Association (TÜV). They employ robust controls to secure the availability and security of their systems, including backup power, fire detection, suppression equipment, and secure device destruction.


On-Site Security
IONOS implements layered physical security controls, including vetted security guards, fencing, video monitoring, intrusion detection technology, and more.

Network Security


Threat Detection
Goldphish leverages threat detection services within IONOS to continuously monitor for malicious and unauthorised activity.


Vulnerability Scanning
We perform regular internal scans for vulnerabilities. Identified issues are tracked until remediation.


DDoS Mitigation
Goldphish uses multiple DDoS protection strategies and tools to mitigate threats. We utilise IONOS’s DDoS protection and application-specific mitigation techniques.


Access Control
Access is limited to the least privileged model required for staff. This is subject to frequent internal audits, technical enforcement, and monitoring to ensure compliance. Multi-factor authentication (MFA) is required for all production systems.

Encryption


In Transit
Communication with Goldphish is encrypted with TLS 1.2 or higher over public networks. We follow best practices for cipher adoption and TLS configuration. 


At Rest
Goldphish data is encrypted at rest with industry-standard AES-256 encryption. By default, we encrypt at the asset or object level. 


Credentials Encryption
Credentials for the production database are regularly rotated to ensure access restriction.

Availability and Continuity


Uptime
Goldphish is deployed on public cloud infrastructure. IONOS offers close to 100% availability with multiple redundant connections to major Internet hubs. Our services are deployed to multiple availability zones for availability and are configured to scale dynamically in response to load. Simulated load tests and API response time tests are part of our release and testing cycle.


Disaster Recovery
Our services are deployed in parallel at two separate data centres. In the event of a problem at one data centre, the system automatically switches to the second, ensuring continuous availability.


Database Recovery
Our database has point-in-time recovery for up to four days and is manually backed up daily, with a maximum of 30 backups. 


UPS Power Supply
IONOS data centres maintain an uninterruptible power supply (UPS) due to emergency diesel generators and VRLA batteries.

Application Security


Quality Assurance
Goldphish’s Quality Assurance team reviews and tests code per pod basis. The security team investigates and recommends remediation of security vulnerabilities within the code.


Environment Segregation
Testing, staging, and production environments are logically separated. No customer data is used in any development or test environment.


Application Scanning
Site Scan from SiteLock is used to protect our site from hackers, malware, and unauthorised access.


Penetration Testing
We carry out annual penetration tests to identify and address potential security vulnerabilities. These tests are performed by independent security experts to ensure the highest level of security for our systems and data.

Endpoint Security


Antivirus
We implement endpoint Antivirus and run daily scans on our machines.


Password Policy
Goldphish maintains a hard password policy on all servers, personal computers, and laptops. All passwords must be at least seven characters long and include one capital letter and one number.


Spam Checks
All incoming emails are filtered for SPAM and quarantined for checking before delivery to the network.


Remote Working
Goldphish operates a 100% remote working international team. Staff are not permitted to work on personal computers unless a prior agreement has been stated.


Cyber Essentials Accredited
Goldphish is Cyber Essentials certified, demonstrating our commitment to maintaining robust cybersecurity standards and protecting against common cyber threats. 

Personal Security


Security Awareness
Goldphish delivers a robust Security Awareness Training programme within 30 days of new hires and continuously for all employees. Quarterly focused training is rolled out to key departments, including Secure Coding, Data Legislation, and Compliance obligations.


Information Security Programme
Goldphish has a comprehensive set of information security policies covering various topics. These are disseminated to all employees and contractors, with acknowledgement tracked on key policies such as Acceptable Use, Information Security Policy, and our Employee Handbook.


Employee Background Checks
All Goldphish employees undergo a background check covering 5 years of criminal history (where legal) and 5 years of employment verification before employment.


Confidentiality Agreements
All employees are required to sign Non-Disclosure and Confidentiality agreements.


Access Controls
Access to systems and network devices is based on a documented, approved request process. Logical access to platform servers and management systems requires two-factor authentication. Access is further restricted by system permissions using a least privilege methodology. Business need revalidation is performed quarterly to ensure access is commensurate with the users’ job function. User access is revoked upon termination of employment or change of job role.

Third-Party Security


Vendor Management
Goldphish understands the risks associated with improper vendor management. We evaluate and perform due diligence on all of our vendors before engagement to ensure their security is to a suitable standard. If they do not meet our requirements, we do not move forward with them. Selected vendors are then monitored and reassessed on an ongoing basis, considering relevant changes.


___________________
 

 

Data Privacy


Below is some key information on how we securely store your data:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

What We're Storing
We store only necessary information, as collected by you. We never store any of your users' credentials that are compromised during a phishing simulation. Our phishing simulation landing pages do not capture data entered on the phishing landing pages; it only tracks that the user failed the data entry portion of the test.


How We're Storing It
We encrypt your data both at rest and in transit. Our site and storage processes are designed for security.


Who Can Access It
We have extensive internal access controls and regulations for the Goldphish team, who only have access to data under limited conditions. You can restrict admin access to sensitive materials.


Our Core Standards
Our core compliance with the act means that:

  • We have full awareness of where any of your data is being held, ensuring appropriate compliance outside of the UK.

  • We ensure that only those who require access to your data can access it and have the highest level of protection against unauthorised access.

  • We ensure you have the right to view, amend, export, or delete any information that we hold on your behalf, including anything held by 3rd party services.

  • We ensure that consent is given during the signup process for all who use Goldphish and allow you to withdraw at any time.


Privacy Policy
Goldphish’s privacy policy, which describes how we handle data input into GoldPhish, can be found at Privacy Policy. For privacy questions or concerns, please contact info@goldphish.com.

Supplier Name

Goldphish Ltd

Company Number

10333752

ICO Number

ZA276913

Cyber Essentials Certificate

e82d770c-a465-462d-a8df-9d15444dcede

Cyber Essentials Certificate

These responsibilities are shared between Dan Thornton (CEO) and Marius Potgieter.

Sub-Processors (used to process personal data)

Logos-colour.png

Identifying, accessing, and amending data

 

Customers have the ability to identify, access, and amend their own data within the Goldphish platform which can only be accessed by authorised individuals in the business.

Deleting data from the application

 

Data can be deleted from the application by the customer and restored within 7 days, at which point it is removed from the Goldphish database permanently.

Downloading user information

 

Customers can also download the user information out of the application for use within their own reporting tool.

Last Updated: 28 October 2024

bottom of page