Privacy Policy

 

In our Privacy Policy we will explain how and why your data is being used in all our products.

 

Cyberlitica does not collect or share any personal information. It’s as simple as that. We believe our customers complete privacy is the utmost concern in all of our products.

We take extreme measures to ensure confidentiality, integrity, and availability.

 

We only communicate over encrypted channels to keep your employee’s information confidential. We calculate a hash sum on all files being sent over the internet and match that up with the receiver to ensure integrity of your data.

 

Cyberlitica Dark Web Password Search

The over 600 million passwords that are stored in the Password Search Database are completely unique, taken from billions of entries from thousands of different Data Breaches. All of the passwords stored in our database are encrypted in SHA-1 hash; we are not storing actual user’s credentials.

 

We do not log any information from our Password Search page ensuring that your data is safe. It encrypts the password typed in on the client side and sends it over the internet in a hash. The data sent to our database is immediately deleted off our online server once you receive your results. If preferred you may also encrypt your passwords in SHA-1 hash and send us that list by end-to-end encrypted chat so we can run your passwords completely offline.

 

Cyberlitica Dark Web Audit

Cyberlitica’s Dark Web Audit searches billions of records from major Data Breaches. (See our Data Breach Catalog to find out more) For the Dark Web Audit you will send us your employees’ email list and we run a search checking to see if their email was found on the Dark Web.

 

The only information you need to provide for our Dark Web Audit is employees’ email addresses; however, you may want to send us their first name, last name, and title to make it easier to read your reports. We do not store any email list results after they have been sent to our client. Our program runs this search offline in our databases so nothing is being sent over the internet.

When a data breach database is loaded into Cyberlitica we do not include victims phone numbers, names, or any other identifiable information. We are only concerned with checking to see if your email address was found in the breach.

 

Cyberlitica Phishing Simulation

Cyberlitica’s Phishing Simulation offers ready-to-launch fun engaging interactive training courses, your own branded cyber portal, reporting, and certificates. After you upload your employees’ email list we keep the data offline to ensure confidentiality and integrity. We collect your employees’ first name, last name and email address. We only use this information to create reports. Your cyber portal will be kept password protected in order to prevent unauthorized personnel from accessing it. 

 

How Cyberlitica Protects Data

All data transmitted over the internet is sent using HTTPS to ensure anonymity. Rate limits are set for our Password Search function which prevents attackers from abusing the website. We regularly scan and patch all software being used to prevent any known vulnerabilities.

 

Changes to this Privacy Policy

We may update this policy from time to time. If we make any changes to our Privacy Policy we will use commercially reasonable efforts to notify you. The changes will go into effect on the “Last Updated” section on the top of the page when we make any changes. Your continued use of the Service constitutes your consent to be bound by the revised Privacy Policy.

 

Contact Us

If you have any questions regarding our privacy policy please email us at info@cyberlitica.com

Contact Information:

Phone: 917-740-7649

info@cyberlitica.com

© 2017-2019 Cyberlitica,Inc-All Rights Reserved

Linkedin