Security & Data Protection in LINK: On Achieving SOC 2 Type 1 Compliance 

As our customers know, security and data protection are core priorities of the LINK App. Designed to handle highly sensitive documents and emails, the LINK App ensures the highest level of data security—whether for high-stakes M&A, litigation, or healthcare matters. 

We are proud to announce that Mobile Helix has successfully achieved SOC 2 Type 1 compliance. This rigorous security framework evaluates an organization’s policies and controls to ensure robust data protection. 

We view earning SOC 2 Type 1 compliance as a significant milestone in our ongoing commitment to designing secure products and maintaining strict operational controls to safeguard data confidentiality and privacy. This achievement required the dedication of our entire team, and I am grateful for their hard work.  

As we continue to strengthen our security practices and regulatory compliance, protecting our customers’ data remains our highest priority.  

– Seth Hallem, Co-Founder & CEO, Mobile Helix

Protect Your Data in a Remote Work Environment – ILTA Educational Webinar

Working remotely became a neccessity almost overnight. But were firm architectures ready? Two common entry points to system hacks, social engineering and network vulnerabilities, threaten the security of remote working. In this session, Mobile Helix CEO and Chief Architect, Seth Hallem, will describe these vulnerabilities and propose practical and actionable ways to address these weaknesses using safe browsing, network proxies, authentication, authorization, and DLP. These mitigations apply to both desktop and mobile devices.

This is an ILTA Educational Webinar. It is free to members as well as to non-members as part of ILTA’s COVID-19 content. Non-members may register for a free login-in.

WATCH THE RECORDED WEBINAR HERE

Outline:

I. Social engineering: Phishing, “Water Hole,” SIM card swaps

   Mitigations including:

    A. Safe browsing

    B. No SMS

    C. Web filtering via proxying

    D. Data Loss Prevention (DLP): printing, recipient checking, metadata filtering

II. Network vulnerabilities

    Mitigations including:

    A. Layered security

    B. Filter – proxy

    C. Authenticate the source – certificates, IP fencing, DoS defense

    D. Authenticate the user – AD credentials, complex passwords, SSO

    E. Authorize – manage email attachments

III. Example of a secure architecture

We welcome you and your questions on June 10th.

Write to us at: contact@mobilehelix dot com.

-Maureen