Download PDF version Contact company

KnowBe4, a provider of security awareness training and simulated phishing, has completed a rigorous third-party audit of its data security procedures and processes under the System and Organization Controls 2 (SOC 2) Type 2 standards. KnowBe4 completed the SOC 2 Type 1 examination in April, and immediately initiated action to achieve a SOC 2 Type 2 status.

The examination that led to compliance with the demanding SOC 2 Type 2 data security standards was administered by the professional IT compliance and audit staff at 360 Advanced, a national HITRUST CSF, Qualified Security Assessor, and Certified Public Accountant firm based in St. Petersburg, FL.

SOC standards

We are in the security business, so we must hold ourselves to the very highest standards of privacy and protection of personally identifiable information, and the annual SOC reports by outside third parties attest to the culture of security here at KnowBe4,” said Brian Jack, Chief Information Security Officer for KnowBe4.

Having achieved these SOC standards streamlines the path to onboarding a customer because they are aware of the rigorous standards we adhere to manage their data. The designation can actually shorten the sales process as it is a competitive advantage we have since we are the first in our market to meet this criterion.”

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...