Security Practices
Last updated: December 17, 2025
TKOResearch LLC · 1500 Chestnut Street Suite 2, Philadelphia, PA 19102
Overview
TKOResearch provides technical analysis, threat intelligence, and technical security services for private sector clients. This page describes how we handle data, protect systems, and maintain operational security for our engagements.
We are a principal-led boutique practice. The practices described here reflect our actual operational procedures, not aspirational marketing claims.
Data Handling
Client Artifacts & Case Data
- Physical artifacts is stored in locked, access-controlled laboratory space
- Digital artifacts is stored on encrypted drives (AES-256) with documented chain of custody
- Artifacts is retained only for the duration specified in engagement agreements, then securely destroyed
- We do not share client artifacts with third parties except as required by law or with explicit written authorization
Communications
- Sensitive case communications available via Signal upon request
- Standard communications via email ([email protected])
- We do not store client credentials or access keys beyond the engagement period
Infrastructure Security
Website & Public Systems
- This website is hosted on Vercel with automatic TLS
- No customer PII is stored on the public website
- Contact form submissions are transmitted via encrypted API to our email system
- Analytics are privacy-focused with consent management
Internal Systems
- Analysis workstations are air-gapped or network-isolated during artifacts examination
- Multi-factor authentication required for all internal systems
- Regular software updates applied to analysis tools and operating systems
Crisis Management
In the event of a security incident affecting client data, we will:
- Notify affected clients within 72 hours of confirmed breach
- Provide a written incident report describing the scope and remediation
- Cooperate with client security teams and legal counsel as needed
To report a security incident involving TKOResearch systems or data, contact:[email protected]
Vulnerability Disclosure
We welcome responsible security research on our public-facing systems. If you discover a vulnerability in tkoresearch.com or related TKOResearch properties:
- Report to: [email protected]
- Include technical details sufficient to reproduce the issue
- We will acknowledge receipt within 5 business days
- We will not pursue legal action against good-faith security researchers
For full details, see our Vulnerability Disclosure Policy.
Limitations
We are a small practice without the infrastructure of a large enterprise. Specifically:
- We do not maintain SOC 2 or ISO 27001 certifications
- We do not have 24/7 monitoring capabilities for our own systems
- Physical security is appropriate for a professional office, not a government SCIF
Our security practices are appropriate for the sensitivity of the work we perform. Clients with specific compliance requirements (HIPAA, CJIS, etc.) should discuss their needs during the scoping process.
Contact
For security-related inquiries:
- Email: [email protected]
- Phone: +1 (445) 895-1790