{"id":4322,"date":"2024-05-22T11:23:39","date_gmt":"2024-05-22T15:23:39","guid":{"rendered":"https:\/\/cxgenies.com\/en\/?page_id=4322"},"modified":"2024-05-22T11:23:39","modified_gmt":"2024-05-22T15:23:39","slug":"security-and-compliance","status":"publish","type":"page","link":"https:\/\/cxgenies.com\/my\/security-and-compliance\/","title":{"rendered":"Security and Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4322\" class=\"elementor elementor-4322\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88fb74c e-flex e-con-boxed e-con e-parent\" data-id=\"88fb74c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dc1b34 line-undertext three elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1dc1b34\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Uncompromised Security &amp; <span class=\"one\">Rigorous Compliance<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-585f007 e-con-full e-flex e-con e-child\" data-id=\"585f007\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f48791 e-con-full e-flex e-con e-child\" data-id=\"9f48791\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-05e87b2 e-con-full e-flex e-con e-child\" data-id=\"05e87b2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38c3d14 elementor-widget elementor-widget-heading\" data-id=\"38c3d14\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Multi-Factor <br>Authentication (MFA)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c5bfc6 elementor-widget elementor-widget-text-editor\" data-id=\"0c5bfc6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Adds an extra layer of security by requiring users to verify their identity through multiple steps. By combining something the user knows (password) with something they have (e.g., a smartphone or hardware token), MFA ensures only authorized personnel can access sensitive information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cf9041 e-con-full e-flex e-con e-child\" data-id=\"3cf9041\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b9ab05 elementor-widget elementor-widget-heading\" data-id=\"1b9ab05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Role-Based <br>Authentication<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bcf6e9 elementor-widget elementor-widget-text-editor\" data-id=\"6bcf6e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tControl access to sensitive information based on user roles, ensuring employees only have access to features and data necessary for their responsibilities. Permissions can be fine-tuned to align with your organization\u2019s security policies.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a076df e-con-full e-flex e-con e-child\" data-id=\"8a076df\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b21876a elementor-widget elementor-widget-heading\" data-id=\"b21876a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Loss <br>Prevention (DLP)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9c65ba elementor-widget elementor-widget-text-editor\" data-id=\"e9c65ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur DLP safeguards against data breaches and loss through monitoring, classification, and secure handling of sensitive data, ensuring compliance with security standards and preventing unauthorized sharing.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a96662 e-con-full e-flex e-con e-child\" data-id=\"4a96662\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-babf543 e-con-full e-flex e-con e-child\" data-id=\"babf543\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3f7348 elementor-widget elementor-widget-heading\" data-id=\"b3f7348\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrations<br> Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98854b2 elementor-widget elementor-widget-text-editor\" data-id=\"98854b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIntegrated SaaS services are securely authorized with OAuth2, and credentials for these services are never stored.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b68dc2 e-con-full e-flex e-con e-child\" data-id=\"3b68dc2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecf2fa9 elementor-widget elementor-widget-heading\" data-id=\"ecf2fa9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Encryption in <br>Transit and at Rest<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7070a6 elementor-widget elementor-widget-text-editor\" data-id=\"e7070a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBoth idle and active data are encrypted in transit over public networks and securely stored in databases with strong encryption.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff12522 e-con-full e-flex e-con e-child\" data-id=\"ff12522\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56ef0c7 elementor-widget elementor-widget-heading\" data-id=\"56ef0c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data <br>Recovery<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9c306a elementor-widget elementor-widget-text-editor\" data-id=\"f9c306a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRegular data backups with a maximum 24-hour Recovery Time Objective ensure fast and reliable data recovery.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aac0056 e-con-full e-flex e-con e-child\" data-id=\"aac0056\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-124d203 e-con-full e-flex e-con e-child\" data-id=\"124d203\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2b51a2 elementor-widget elementor-widget-heading\" data-id=\"e2b51a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Database <br>Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97cce8c elementor-widget elementor-widget-text-editor\" data-id=\"97cce8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur databases are protected with multi-layer security, including encrypted passwords, two-factor authentication (2FA), and virtual private clouds (VPC) with strict firewall settings\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0f5ab0 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"f0f5ab0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a912d59 elementor-widget-mobile__width-inherit elementor-mobile-align-justify elementor-hidden-mobile elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a912d59\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/calendly.com\/rainier-p5ml\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore the platform<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1811769 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"1811769\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea4fbea line-undertext  elementor-widget elementor-widget-heading\" data-id=\"ea4fbea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"one\">Compliance<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aef0d3d e-con-full e-flex e-con e-child\" data-id=\"aef0d3d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f471049 e-con-full e-flex e-con e-child\" data-id=\"f471049\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d3153b elementor-widget elementor-widget-image\" data-id=\"0d3153b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/cxgenies.com\/my\/wp-content\/uploads\/sites\/3\/2024\/05\/SOC-2.png\" class=\"attachment-large size-large wp-image-4333\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e5b96 elementor-widget elementor-widget-heading\" data-id=\"28e5b96\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">SOC Type 1 and 2 Compliance<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49145b2 elementor-widget elementor-widget-text-editor\" data-id=\"49145b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUpcoming SOC Type 1 and 2 certifications will be granted by leading third-party cybersecurity auditors, reflecting our commitment to maintaining the highest standards in security and internal controls.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Uncompromised Security &amp; Rigorous Compliance Multi-Factor Authentication (MFA) Adds an extra layer of security by requiring users to verify their identity through multiple steps. By combining something the user knows (password) with something they have (e.g., a smartphone or hardware token), MFA ensures only authorized personnel can access sensitive information. Role-Based Authentication Control access to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4322","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>cxgenies | Security and Compliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"cxgenies | Security and Compliance\" \/>\n<meta property=\"og:description\" content=\"Uncompromised Security &amp; Rigorous Compliance Multi-Factor Authentication (MFA) Adds an extra layer of security by requiring users to verify their identity through multiple steps. By combining something the user knows (password) with something they have (e.g., a smartphone or hardware token), MFA ensures only authorized personnel can access sensitive information. Role-Based Authentication Control access to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"cxgenies malaysia\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\",\"url\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\",\"name\":\"cxgenies | Security and Compliance\",\"isPartOf\":{\"@id\":\"https:\/\/cxgenies.com\/my\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png\",\"datePublished\":\"2024-05-22T15:23:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage\",\"url\":\"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png\",\"contentUrl\":\"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cxgenies.com\/my\/security-and-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cxgenies.com\/my\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cxgenies.com\/my\/#website\",\"url\":\"https:\/\/cxgenies.com\/my\/\",\"name\":\"cxgenies malaysia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cxgenies.com\/my\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cxgenies.com\/my\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cxgenies.com\/my\/#organization\",\"name\":\"cxgenies malaysia\",\"url\":\"https:\/\/cxgenies.com\/my\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cxgenies.com\/my\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cxgenies.com\/my\/wp-content\/uploads\/sites\/3\/2024\/05\/Logo-cxgenies-white.svg\",\"contentUrl\":\"https:\/\/cxgenies.com\/my\/wp-content\/uploads\/sites\/3\/2024\/05\/Logo-cxgenies-white.svg\",\"width\":350,\"height\":95,\"caption\":\"cxgenies malaysia\"},\"image\":{\"@id\":\"https:\/\/cxgenies.com\/my\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"cxgenies | Security and Compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cxgenies.com\/my\/security-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"cxgenies | Security and Compliance","og_description":"Uncompromised Security &amp; Rigorous Compliance Multi-Factor Authentication (MFA) Adds an extra layer of security by requiring users to verify their identity through multiple steps. By combining something the user knows (password) with something they have (e.g., a smartphone or hardware token), MFA ensures only authorized personnel can access sensitive information. Role-Based Authentication Control access to [&hellip;]","og_url":"https:\/\/cxgenies.com\/my\/security-and-compliance\/","og_site_name":"cxgenies malaysia","og_image":[{"url":"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/","url":"https:\/\/cxgenies.com\/my\/security-and-compliance\/","name":"cxgenies | Security and Compliance","isPartOf":{"@id":"https:\/\/cxgenies.com\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png","datePublished":"2024-05-22T15:23:39+00:00","breadcrumb":{"@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cxgenies.com\/my\/security-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/#primaryimage","url":"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png","contentUrl":"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cxgenies.com\/my\/security-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cxgenies.com\/my\/"},{"@type":"ListItem","position":2,"name":"Security and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/cxgenies.com\/my\/#website","url":"https:\/\/cxgenies.com\/my\/","name":"cxgenies malaysia","description":"","publisher":{"@id":"https:\/\/cxgenies.com\/my\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cxgenies.com\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cxgenies.com\/my\/#organization","name":"cxgenies malaysia","url":"https:\/\/cxgenies.com\/my\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cxgenies.com\/my\/#\/schema\/logo\/image\/","url":"https:\/\/cxgenies.com\/my\/wp-content\/uploads\/sites\/3\/2024\/05\/Logo-cxgenies-white.svg","contentUrl":"https:\/\/cxgenies.com\/my\/wp-content\/uploads\/sites\/3\/2024\/05\/Logo-cxgenies-white.svg","width":350,"height":95,"caption":"cxgenies malaysia"},"image":{"@id":"https:\/\/cxgenies.com\/my\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/pages\/4322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/comments?post=4322"}],"version-history":[{"count":0,"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/pages\/4322\/revisions"}],"wp:attachment":[{"href":"https:\/\/cxgenies.com\/my\/wp-json\/wp\/v2\/media?parent=4322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}