Layered Security and Protection
All of our services are embedded with the following enterprise-level cyber security measures and practices. We believe cyber security should be continuously improved which is why we proactively strengthen our security technology and expertise.
Processes & Protocols
SOC 1 Type 2 Compliance
Annual SOC 1 audits to our locally hosted servers and internal processes to manage cloud. This ensures your data and applications are stored under stringent industry standard processes and protocols.
IT Process and Protocol Reviews
Annual reviews and updates to our internal IT security procedures. We also provide audit reports to partners that require vendor regulatory compliance.
Intrusion Detection & Prevention
Anti-virus / Anti-malware
Software that is applied to desktops and servers. Keeping your systems secure from malware and viruses with automated threat detection, mitigation, and protection.
Firewall
Security systems to monitor and protect your infrastructure against network traffic attacks.
Desktop, Server, & Network Monitoring
Proactive human and automated monitoring across all of your IT systems, to identify and action potential vulnerabilities and threats.
Vulnerability Testing
Routine IT environment assessments to identify security weak points and provide proactive defence recommendations.
Data Loss Prevention
Email Security Gateway
A proactive platform that stops email threats before they breach your network. Incoming emails are scanned for spam, virus, malware, and phishing attempts.
Backups & Recovery
Data-protection for information storage and retrieval when you work with our cloud offering. We ensure our cloud solutions are backed up to a separate data facility location to ensure business continuity and disaster recovery.
Disk Encryption
An added layer of data security to prevent unauthorized access in the event of device theft or loss.