Our Security Values
We follow a high standard of information and cyber security controls that are based on the industry standards and in line with our commitment to protect our client’s information that they trust with us, as well as our own critical business infrastructure and assets.
To keep this commitment, we employ a set of policies, standards, and procedures with a variety of techniques and tools, including user access controls, firewalls, standard data encryption, and secure cloud deployment, wherever applicable. We judiciously deploy third-party services, such as Cloud services after proper scrutiny and due diligence. We perform vulnerability and code scans regularly to ensure our computer systems, network, and applications are not exploited by any external forces. We engage with professional experts to perform penetration tests annually to identify and fix security vulnerabilities before they can be exploited by attackers
We are committed to following the data security and privacy guidance as specified by our clients, and the prevailing and relevant regulations and laws of the land.
Our mission is to have information security by design.
Below are some of the major safeguards we have in place to protect the environment we operate and manage:
- Policy and Procedure: A set of security policies and standard operating procedures
- Secure Cloud for our services: A dedicated and controlled environment for handling sensitive client data
- User Access Controls
- Data Encryption: We have encryption technology in place that allows for the protection of data in transit and in critical data in storage
- Logging and Monitoring of critical business activities
- Deployment of industry-standard third-party services and tools
- Ongoing engagement with the industry’s security experts.