Our website is currently under construction and we hope to have our redesigned site up and running very soon.
Privacy and control features
Custom control users’ access to features based on privacy settings. Configure your privacy settings quickly and easily with simple UI controls.
Data encryption
Encryption is implemented when data is in transit or at rest over public networks and in our databases
Database security
Databases have multi-layer security including encrypted passwords, two factor authentication, intrusion detection systems, and VPC with strict firewall settings.
Penetration testing
A certified third party consultant conducts annual penetration tests.
Internal and external audits
Audits are carried out regularly to review access control, risk, information security, IT infrastructure, and HR procedures.
Data recovery
Frequent data backup with a maximum 24-hour Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Ensure rigor with employees
All of our employees must complete regular security training on industry best practices with regular third-party audits.
Vulnerability scanning
Our computers, databases and applications are run against a program regularly to check for weaknesses.