Our Security Measures

Database Redundancy

Spans across 4 servers

Encrypted Channels

For all customer communication

Proven Restore Procedures

All data backed up to trusted third-parties

2 Factor Authentication

Critical infrastructure protected by security industry best practices

Up to Date Dev & IT Team

Educated with latest threats and mitigation

Threat Detection

Implemented on internal network and cloud

Latest Software

We keep up to date with the latest patches and mitigations

Annual Penetration Tests

Against all critical infrastructure