Security Protocols

At CTA Review, safeguarding your personal information is paramount. We’ve prioritized using highly reputable service providers to ensure the secure transfer of your data during system setup. Below, you’ll find details on the protective measures we’ve implemented to uphold the security of your data. 

Additionally, CTA Review does not engage in selling or sharing your data with any third party for profit or monetary benefit. 


CTA Review maintains an SSL Certificate and Web Application Firewall (WAF) and provides HTTPS encryption through GoDaddy’s hosting platform. We also utilize GoDaddy’s top-tier full domain protection.  This security level prevents unauthorized domain actions, such as transferring away, changing nameservers and editing domain contact info. 

Interface Security

CTA Review also safeguards its website interface using Sucuri Inc., which is a globally recognized authority in all matters related to website security, with specialization in WordPress Security.

The Sucuri security suite complements our existing security posture. It offers its users a set of security features for our website, each designed to have a positive effect on our security posture:

  • Security Activity Auditing
  • File Integrity Monitoring
  • Remote Malware Scanning
  • Blocklist Monitoring
  • Effective Security Hardening
  • Post-Hack Security Actions
  • Security Notifications


Passwords are stored ‘salted’ and ‘hashed’ in accordance with Open Worldwide Application Security Project recommendations so that they cannot be decrypted and read.

Cybersecurity is secured utilizing a cybersecurity service, Wordfence. Its focus is protecting CTA Review from various online threats such as malware, hacking attempts, and other forms of malicious activity.   The following security measures are included:

1. Firewall: blocks malicious traffic before it reaches your website.

2. Malware Scanner: Scans files and databases for malware and other security vulnerabilities.

3. Login Security: Enhanced login security.  Two-factor authentication and login attempt monitoring.

4. Brute Force Protection: Protects against brute force attacks by limiting login attempts and blocking IP addresses with suspicious activity.

5. Security Notifications: Alerts website owners of potential security issues and provides detailed reports on threats detected.

6. Security Hardening: Security hardening options used to strengthen the overall security posture of

Data Transport

Data transport is encrypted with TLS: Communication between the web browser, related apps, and servers is secure.


Our secure database used to store information at CTA Review is a fully customizable platform utilizing security measures such as encryption, access controls, and user authentication.  

  1. Data Encryption: data is encrypted both in transit and at rest, ensuring that information remains secure even if intercepted or accessed without authorization.
  2. Back-Up Data Storage:  data is stored in an encrypted format at separate data center locations. Limiting the potential of a widespread data hack.
  3. Access Controls: permissions and access levels have been sent for different individuals or groups within the database user platform. This allows principals to control who can view, edit, or delete specific data.
  4. User Authentication: users must authenticate themselves before accessing the system. This involves username and password authentication.  To access sensitive data, two-factor authentication (2FA) is utilized for added security.
  5. Audit Trails: administrators are capable of monitoring changes, identifying potential security breaches, and maintaining accountability within the team of users.
  6. Regular Updates: regular updates and patches are provided by the database originator to address security vulnerabilities and improve overall system security as needed.