Encryption – We secure our networks and environments with strong AES 256 encryption for data in transit and at rest.
Authentication – We require strong, complex passwords for access to systems
Protection – We administer security controls administered on network and environments that are tested and validated, such as Data Loss Prevention and Multi-factor Authentication protocols.
Integrity – We guard your data by routinely monitoring, logging and auditing protocols in place to keep your data secure and up to date.
Back-ups – We back-up our systems every day to maintain up-to-date records.
Disaster Recovery – We have a full Disaster Recovery Plan and Business Continuity of Operations Procedures, with a secondary, geographically divided site available if necessary.
Vulnerability Management Program – We have a rigorous vulnerability assessment protocol, including at least annual penetration tests and quarterly vulnerability scans
Patch Management Program – We maintain a patch management policy and procedure to mitigate identified vulnerabilities