Skip to main content

Work without worry

Learnosity’s enterprise-grade data security protects the information of millions of learners around the world.

https://learnosity.com/wp-content/uploads/2023/09/privacy-page-hero.png

Total security, zero stress

Your product can never be too safe, so we employ multiple layers of protection against bad actors.

Product security

  • HTTPS and disk-based encryption

    Our robust security standards include TLS encryption in transit and AES 256 encryption at rest.

  • Authentication

    We enforce two-factor authentication (2FA) on login to our Author Site to ensure your proprietary content can only be accessed by the right people.

Network security

  • Multi-tiered security model

    Our numerous lines of defense include VPN usage from IP-restricted locations, putting public-facing web servers behind port-restricted load balancers, and using SSH with public key encryption across all servers for maintenance communications.

  • Data location

    We’re currently hosted on AWS in the US, EU, and Australia, so our customers can choose where they want to store their encrypted data.

  • Failsafes

    Where possible, our production systems use immutable images to ensure a consistent operating state.

Additional security features

  • Continuous learning

    We’re always vigilant against possible threats. We run regular security workshops to educate staff, share knowledge on the challenges we face, and determine the safest options during development.

  • Penetration testing

    We run regular third-party penetration tests to assess the strength of our systems’ defenses.

  • Policies

    We’ve developed an in-depth set of privacy and security policies covering a range of topics, which we update regularly.

Meet our security experts

Alan Garfield

Alan Garfield

Principal Engineer

Mark Lynch

Mark Lynch

Chief Strategy Officer and Co-founder

Alan Garfield

Alan Garfield

Principal Engineer

Alan Garfield

Principal Engineer

1. Your number one principle for data security?

Attention to details matter. 90% of the time, a breach or an exploit happens because something really simple was missed or one simple change was made that caused the problem. This can be as simple as receiving an email and mistaking an illegitimate request as a legitimate one. Or accepting the default setting when making some change to a running system. It's never foolproof, but paying attention to the details of things really does matter.

2. Most rewarding part of the job?

Helping the team, and growing with them. No one person can do and know everything. Everyone in history is standing on the shoulders of those before us. Recognizing that and helping to lift others up and sharing my experiences makes me happy.

3. Ever consider becoming a hacker?

I like puzzles and problems. But many puzzles don't lead to legal issues. I've always preferred to share and protect, than break and exploit. Plus you can more freely talk about what you do without fear. :D

Mark Lynch

Mark Lynch

Chief Strategy Officer and Co-founder

Mark Lynch

Chief Strategy Officer and Co-founder

1. Your number one principle for data security?

Don't collect it if you don't need it. We have designed a system that only collects data that is the minimum to provide the service. We don't need to know the name/age/gender of any of the students answering questions - we just need to know what they answered. It keeps it simpler, and reduces security risk.

2. Most rewarding part of the job?

Seeing the awesome ways that people use our technology. The most recent example of this was a program of learning to teach media literacy, which is more relevant now than it every has been, to teach children (and adults) how to discern #realnews from #fakenews.

3. Ever consider becoming a hacker?

Not again, no ;) My hacking exploits were limited to reverse engineering the copy prevention on Commodore 64 games when I was a kid and had more free time and no money. I had some successes and many failures – but in the end, this was what drove my interest and passion in software development.

Discover our ethos

Four suggestions for getting privacy right when developing edtech
Principles
Data & Security

Four suggestions for getting privacy right when developing edtech

As digital interactions increase, so does the flow of data and the risk of its misuse. But edtech can respect and protect learner privacy. John Kleeman, EVP at Learnosity & Questionmark, explains how.

by John Kleeman
Read Time 4 Mins
Infrastructure as code: Successfully scaling to new heights
Process
Engineering

Infrastructure as code: Successfully scaling to new heights

How do you prepare a product to meet the demands of a rapidly growing user base? Meet someone who knows. Alan Garfield is a busy…

by Micheál Heffernan
Read Time 8 Mins
The gathering storm: Student data security in the Digital Age
Principles
Learning & Development

The gathering storm: Student data security in the Digital Age

How can student data security be guaranteed when faced with a threat that can neither be detected nor predicted? In the not-too-distant past, banks represented…

by Micheál Heffernan
Read Time 6 Mins

Reporting security vulnerabilities

We investigate all legitimate reports of security vulnerabilities and do our best to quickly fill the gap in our defenses, and authorize the public to conduct good-faith research with the intent of reporting such vulnerabilities to Learnosity. If you believe you have found a vulnerability in any of our sites or products, please let us know ASAP at security@learnosity.com.

Let's play it safe

Security is a big deal. If you need more details about how we protect our customers, contact our team today.

Get in touch