We have implemented a comprehensive Information Security Program thoroughly integrated throughout our organization. This strategy is based on the SOC 2 Framework, an information security audit system established by the American Institute of Certified Public Accountants.
Our organization willingly subjects itself to impartial, third-party evaluations designed to assess our security measures and compliance controls rigorously.
At a minimum, we conduct independent third-party penetration tests annually to guarantee that the security integrity of our services is maintained.
The roles and responsibilities concerning our Information Security Program and safeguarding our clients’ data are meticulously outlined and documented. It’s mandatory for our team members to thoroughly review and comply with all of the established security policies.
All team members are obligated to participate in employee security awareness training. This compulsory program incorporates the study of industry-standard techniques and critical information security subjects such as phishing and the appropriate management of passwords.
Each team member must sign and uphold an industry-standard confidentiality agreement before commencing their initial day of work.
We conduct comprehensive background checks on all prospective team members in strict compliance with local legislation.
All our data is stored on Amazon Web Services (AWS) databases. Each of these databases is situated within the United States. Please refer to the vendor-specific documentation provided before this note for additional information.
All databases are securely encrypted while at rest.
Our applications encrypt in transit with TLS/SSL only.
We perform vulnerability scanning and actively monitor for threats.
We actively monitor and log various cloud services.
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team if any failures affect users.
We have a process for handling information security events, which includes escalation procedures, rapid mitigation, and communication.
Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their roles.
Where available, we have Single Sign-on (SSO), 2-factor authentication (2FA), and strong password policies to protect access to cloud services.
We follow the principle of least privilege for identity and access management.
We perform quarterly access reviews of all team members with access to sensitive systems.
All team members must adhere to a minimum set of password requirements and complexity for access.
All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
We undergo at least annual risk assessments to identify potential threats, including considerations for fraud.
Vendor risk is determined, and the appropriate vendor reviews are performed before authorizing a new vendor.