Security

As a company that takes data security and privacy very seriously, we recognize that TopLine’s information security practices are important to you. While we don’t like to expose too much detail around our practices (as it can empower the very people we are protecting ourselves against), we have provided some general information below to give you confidence in how we secure the data entrusted to us.

Data Center Security

  • Our technical platform’s data centers manage physical security 24/7.
  • We have DDOS mitigation in place at our service providers.
  • We have a documented business and infrastructure continuity plan.

Protection from Data Loss, Corruption
All access is enforced at the database level to ensure you only have access to your data, ensuring user accounts and company instances are segregated from each other.
Account data regularly backed up off site.

Application Level Security

  • TopLine uses your corporate account via Microsoft AAD or Google GCP. Our own staff has no access to your password. If you lose your password, it can’t be retrieved—it must be reset from your corporate network.
  • All login pages (from our website and mobile website) pass data via TLS 1.2 or higher.
  • The entire TopLine application is encrypted with TLS 1.2 or higher.
  • Login pages and logins via the TopLine API have brute force protection.

Internal IT Security

  • TopLine offices are secured by keycard access, and they are monitored.
  • Our office network is segmented and centrally monitored.

Internal Protocol and Education

  • We continuously train employees in the best security practices, including how to identify social engineering, phishing scams, and hackers.
  • Employees on teams that have access to customer data (such as tech support and our engineers) undergo criminal history and credit background checks prior to employment.
  • In order to protect our company from a variety of different losses, TopLine has established a comprehensive insurance program. Coverage includes but is not exclusive to: coverage for cyber incidents, data privacy incidents (including regulatory expenses), general error and omission liability coverage, excess cyber liability coverage, property and business interruption coverage.

Protecting Us All
If your computer gets compromised and someone gets into your TopLine account, we want to ensure we are all protected.

  • We monitor and will automatically suspend accounts for signs of irregular or suspicious login activity.
  • We monitor accounts and campaign activity for signs of abuse.
  • We only allow you to sign in with your Microsoft AAD or Google GCP credentials.
  • We provide the ability to establish tiered levels of access within accounts.