SECURITY

Keeping your data secure is foundational to our business

We work hard to ingrain information security in our company culture from senior management down.

We demonstrate our commitment to security by adhering to industry best practice technical controls and policies and procedures as recommended by the Center for Internet Security -- an organization spearheaded by the National Security Agency that sets benchmarks and configuration guidelines as developed by an international community of cybersecurity experts -- along with NIST and SANS.org.

Additionally, we leverage the counsel and oversight of an independent third party security firm to ensure that we execute our information security policies and reporting in the best possible way on an ongoing basis, and we conduct regular vulnerability scans and external penetration tests. Given the evolving nature of the threat landscape, the security industry’s best practices, and our business needs, we regularly review and update our policies and controls.

Security, reliability, & verification

  • Our infrastructure runs on Amazon Web Services, ensuring the highest benchmarks in encryption, physical security, and network security.

  • We offer strong password requirements, and where appropriate, multi-factor authentication and single sign on (SSO) capabilities.

  • We enlist independent security firms to conduct third-party penetration tests on a regular basis that assess our software for vulnerabilities.

  • We are committed to comply with the applicable laws and frameworks when handling client data, including but not limited to TCPA and CAN-SPAM.