top of page

Security

Security Strategies: We use a variety of strategies to protect your information. We will not list all the measures we take here (hackers are listening...). But this is an overview of the main methods we use.
Two-Factor Authentication & IP Restriction
  • We use the latest two-factor authentication to log in all users, using an app available for iOS and Android.

  • Simply enter the number sent to your mobile phone after scanning the QR code. You will then be able to log in with your username and password.

  • If you wish, we can restrict all access to your data to one IP address. This would mean that all your users would either have to be in your office or use VPN if they are remote.

Screenshot 2023-02-06 at 13.58.46.png
Security Features Overview
  • Data and file storage:
    All data is immediately written to multiple disks, backed up daily and stored in multiple locations. Files uploaded by our customers are stored on servers that use advanced techniques to eliminate bottlenecks and points of failure.

  • Encryption:
    Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS. Any files which you upload to us are stored and are encrypted at rest. Project data, messages, text documents and todos are not encrypted at rest — they are active in our database. Our backups of your data are encrypted using GPG.

  • Full redundancy:
    Our servers - from the power supply to the internet connection to the air purification systems - are fully redundant. Our systems are designed to continue operating even if several servers fail.

  • Biometrics:
    Our state-of-the-art servers are protected by biometric locks and round-the-clock internal and external surveillance. Only authorised personnel have access to the data centre. 24/7/365 on-site staff provide additional protection against unauthorised access and security breaches.

  • Update regularly:
    You can publish your items to your own website to showcase all the great content you have.

  • Information Protection:
    All credit card transactions are processed using secure encryption - the same level of encryption used by leading banks. Card information is securely transmitted, stored and processed on a PCI-compliant network.

bottom of page