Vyzer encrypts data at rest and in transit.
Ensuring the safety and privacy of your sensitive data is Vyzer’s highest priority.
Vyzer encrypts data at rest and in transit.
Vyzer does not store your banking or crypto account credentials.
Vyzer requires Two-Factor Authentication (2FA) login.
Vyzer hires cybersecurity experts to identify and address vulnerabilities before adversaries do.
Vyzer will never trade, sell, or share your private information or data with a third party.
Create My Free AccountHere are answers to some of the most frequently asked questions we receive regarding our security policies and protocols. If you have more questions, just email us at hello@vyzer.co
Does Vyzer have direct access to my online bank or crypto accounts?
No, Vyzer never directly accesses your banking or crypto account credentials. Instead, we utilize third-party financial account aggregator services, such as Plaid & Salt Edge, to securely connect to your accounts. When you input your banking credentials, they are sent directly to these providers, not to Vyzer's servers. These providers then grant Vyzer a "read-only" access, ensuring we can't access your specific credentials or conduct transactions on your behalf.
Learn more about how Plaid & Salt Edge uphold industry-leading standards for data security, regulatory compliance, and privacy.
Is my data secure with Vyzer?
Absolutely. At Vyzer, your data security is paramount. All information is encrypted both in transit and at rest, ensuring robust protection against potential breaches or interceptions. While we don't use end-to-end encryption, rest assured that our comprehensive security measures are meticulously designed to safeguard your data at every stage. The absence of end-to-end encryption allows us, as your service provider, to access raw data when needed to deliver specific services and functionalities.
What are 'at rest' and 'in transit' encryption?
At Rest Encryption This refers to the protection of your data when it's stored. At Vyzer, all our databases and files reside on Amazon Web Services (AWS) servers. The content is encrypted both while it's idle and during backups. This encryption ensures that even if someone were to access a database backup, they wouldn't possess the decryption key, rendering the data useless and maintaining user security.
In Transit Encryption This pertains to the protection of your data as it travels across the internet. All communications between our servers and your browser are secured via HTTPS. Our strict HTTPS policy ensures that no other protocol is used, guaranteeing all interactions occur over a secure connection.
What is end-to-end encryption?
End-to-end encryption is a security measure that ensures data remains "unreadable" throughout its entire journey from sender to receiver. When data is encrypted using this method, even the service or app facilitating the transmission cannot decipher its contents. Only the specific sender and intended receiver possess the unique keys to decode and access the information, ensuring maximum privacy and security.
Why isn't my data encrypted end-to-end?
While end-to-end encryption would make all of your data inaccessible to Vyzer, such a level of encryption would hinder many of the platform's core functionalities. For instance, we require periodic access to your data for tasks like background syncing and ensuring safe data transfer. Although we don't employ end-to-end encryption, rest assured that your data within Vyzer is securely encrypted both at rest and in transit.
What happens if Vyzer servers are breached?
Even in the unlikely event of a breach, your banking credentials remain secure as we don't store them. For more details, refer to the answer for "Does Vyzer have access to my online bank and crypto account?"
All data within Vyzer is encrypted at rest on AWS servers. This means that even if an unauthorized individual were to access a database backup, they wouldn't be able to decrypt or use the data without the necessary decryption key.
Furthermore, the risk of data being intercepted in transit is minimal. Communication between Vyzer's servers and your browser is secured using HTTPS. Our HSTS policy also ensures that browsers connect to our platform exclusively over a secure connection.
Why is Two-Factor Authentication (2FA) login mandatory?
At Vyzer, we prioritize your security.
While user IDs and passwords are essential, they can be vulnerable, especially if users opt for easily guessable or reused passwords. There's also the risk of passwords being noted down or stored unsafely, making them accessible to potential threats.
2FA addresses these vulnerabilities by adding an extra layer of protection. It combines something you know (your password) with something you have (a one-time password or OTP) or something you are (biometric data like fingerprints). This multi-layered approach significantly enhances the security of your Vyzer account, making it much harder for unauthorized access.
How can I use Vyzer safely?
While Vyzer is designed with security in mind, there are additional precautions you can take:
By following these guidelines, you can maximize the safety of your data while benefiting from Vyzer's features.
Does Vyzer sell my data?
Absolutely not. At Vyzer, your data's privacy is our top priority.
Our primary sources of funding are subscription fees, along with support from our VC partners and angel investors. On the rare occasions when data is shared with third parties, typically for analytics purposes, we take precautionary measures to ensure these entities do not sell or misuse your information.
Your trust is vital to us, and we're unwavering in our commitment to safeguarding your data.
If I delete my data, is it truly gone or can it be restored from a backup?
When you choose to delete your account, we take immediate action. All your data is removed from our primary database without delay. Additionally, we instruct our aggregators to cease any connections to your account and to erase all associated data they hold.
For security and operational reasons, we maintain rotating backups for a period of 30 days. This means that your data will persist in these backups but will be permanently deleted in the subsequent backup cleanup cycle.
Do we conduct external security audits?
Absolutely. We collaborate with reputable external security firms to rigorously assess our application's security. Our commitment extends to regularly partnering with leading security experts to ensure both our internal and external security measures are top-notch.