We have a sophisticated data infrastructure designed securely from the ground up:
- We regularly work with OWASP certified penetration testers to diagnose and resolve any vulnerabilities in our system.
- Access to our data is achieved soley through VPN connections to a private cloud, utilising end-to-end encryption.
- Our primary security credentials: SSL certificates and passwords are rolled on a regular cadence.
- Root access to our data infrastructure is recorded and limited to a small subset of employees.