Data security

We have a sophisticated data infrastructure designed securely from the ground up:

  • We regularly work with OWASP certified penetration testers to diagnose and resolve any vulnerabilities in our system.
  • Access to our data is achieved soley through VPN connections to a private cloud, utilising end-to-end encryption.
  • Our primary security credentials: SSL certificates and passwords are rolled on a regular cadence.
  • Root access to our data infrastructure is recorded and limited to a small subset of employees.