Mythos logo light
Mythos

Security Practices

Your data’s safety is our top priority.

1. Infrastructure Security

Our platforms are hosted on secure cloud providers with hardened configurations, firewalls, and routine vulnerability patching.

2. Data Encryption

All data is encrypted in transit using HTTPS/TLS and at rest when supported by storage services.

3. Access Control

We enforce strict role-based access control (RBAC), audit logging, and multi-factor authentication for all internal systems.

4. Third-Party Services

We evaluate all third-party services for security compliance and maintain signed data processing agreements where applicable.

5. Responsible Disclosure

If you discover a vulnerability in one of our platforms, please report it to us. We’ll investigate promptly and acknowledge your contribution.

6. Contact

For security inquiries, reach out to us.