Skip links

Commitment to Security

Organizational Security

  • Information Security Program.We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.
  • Third-Party Audits. Our organization undergoes independent third-party assessments to test our security and compliance controls.
  • Third-Party Penetration Testing. We perform independent third-party penetration at least annually to ensure that the security posture of our services is uncompromised.
  • Roles and Responsibilities. Roles and responsibilities related to our Information Security Program and the protection of our customers’ data are well-defined and documented. Our team members are required to review and accept all security policies.
  • Security Awareness Training. Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
  • Background Checks. We perform background checks on all new team members in accordance with local laws.

Cloud Security

  • Cloud Infrastructure Security. All our services are hosted with Microsoft Azure. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit https://azure.microsoft.com/en-gb/explore/trusted-cloud/.
  • Data Hosting Security. All our data is hosted on Microsoft Azure databases. These databases are all located in the United States. Please reference the above vendor-specific documentation linked above for more information.
  • Encryption at Rest. All databases are encrypted at rest.
  • Encryption in Transit. Our applications encrypt in transit with TLS/SSL only.
  • Vulnerability Scanning. We perform vulnerability scanning and actively monitor for threats.
  • Logging and Monitoring. We actively monitor and log various cloud services.
  • Business Continuity and Disaster Recovery. We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
  • Incident Response. We have a process for handling information security events which includes escalation procedures, rapid mitigation, and communication.

Access Security

  • Permissions and Authentication. Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their roles. Where available, we have Single Sign-on (SSO), 2-factor authentication (2FA), and strong password policies to ensure access to cloud services is protected.
  • Least Privilege Access Control. We follow the principle of least privilege with respect to identity and access management.
  • Password Requirements. All team members are required to adhere to a minimum set of password requirements and complexity for access.

Vendor Risk Management

Vendor Risk Management. Vendor risk is determined, and the appropriate vendor reviews are performed prior to authorizing a new vendor.

Contact Us

If you have any questions, comments or concerns or if you wish to report a potential security issue, please get in touch with [email protected]