Taylor Martin

  • Total activity 35
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 19

Activity overview

Latest activity by Taylor Martin
  • Taylor Martin created an article,

    JobAdder

    Certn-JobAdder Integration Overview To start a background check in JobAdder, simply select the candidate(s) and the desired Certn package from the actions menu. On submit, JobAdder will send the ca...

  • Taylor Martin created an article,

    What happens in the case of a security incident?

    In the event of an incident, events are to be escalated to our CSIRT (computer security incident response team) which involves personnels from the  Product, PR, Operations, Engineering, and Securit...

  • Taylor Martin created an article,

    How do you maintain current security practices?

    We have a dedicated security team that continuously reviews procedures and policies at Certn to ensure alignment with standards, and to determine what controls, processes and systems need to be upd...

  • Taylor Martin created an article,

    How long do you keep data and what happens when it is deleted?

    Data collected by Certn is retained for a time period agreed on by both parties and deleted thereafter. However, once deleted, data cannot be restored Note:This applies to all data collected by Cer...

  • Taylor Martin created an article,

    What are your encryption methods?

    At rest: Sensitive customer data at rest is encrypted using 256-bit Advanced Encryption Standard (AES).  In transit: All customer data is protected using strong encryption protocols. We ensure all ...

  • Taylor Martin created an article,

    What are your authentication and authorization policies and procedures?

    At Certn, We use SAML single sign on for authorization and authentication with the support of multifactor authentication to ensure users are adequately authenticated before using our system. SSO si...

  • Taylor Martin created an article,

    How do you monitor security threats?

    We employ Security Incident Event Management (SIEM) tools to collect and correlate logs from different application, network and host systems. This alerts on triggers to notify the Security team bas...

  • Taylor Martin created an article,

    Do you employ penetration testing?

    Certn employs third-party experts to perform detailed penetration tests on our core applications in addition to the internal scanning and testing exercises to ensure a good security posture.

  • Taylor Martin created an article,

    Do you perform static code analysis?

    Yes. Our source code repositories are scanned for security issues via our static analysis tooling. The devops and security teams work together to verify the checks and perform manual testing to mak...

  • Taylor Martin created an article,

    What dynamic vulnerability measures are in place?

    We employ automated scanners to continuously and dynamically scan our core applications for potential exploitable vulnerabilities. By conducting these scans, different security risks are averted.  ...