Skip to main content

Infrastructure Security

Data Backups

We create regular backups of internal and member data to ensure it is protected from loss.

Data Classification

Data is treated according to our Data Classification Policy to ensure confidential information is properly secured and restricted to authorised personnel.

Infrastructure Performance Monitoring

We use an infrastructure monitoring tool to monitor systems, infrastructure and performance. The tool generates alerts when specific predefined thresholds are exceeded.

See our operational status live

Intrusion Detection System (IDS)

We use an IDS to monitor network traffic for suspicious activity and act upon alerts that indicate potential security threats.

Network Segmentation

Our network is segmented based on the type of services and sensitivity of information it handles to minimise the risk of unauthorised access and lateral movement in the event of a breach.

Remote Access Encryption

Our production systems can only be remotely accessed by authorised employees via an approved encrypted connection (VPN).

Vulnerability Management

We maintain a Vulnerability Management program to proactively identify security vulnerabilities affecting our systems, networks, and applications. Through periodical scanning and patching, and with the support of our Bug Bounty Program, we reduce the risk of vulnerability exploitation.

Bug Bounty Program