Infrastructure Security
Data Backups
We create regular backups of internal and member data to ensure it is protected from loss.
Data Classification
Data is treated according to our Data Classification Policy to ensure confidential information is properly secured and restricted to authorised personnel.
Infrastructure Performance Monitoring
We use an infrastructure monitoring tool to monitor systems, infrastructure and performance. The tool generates alerts when specific predefined thresholds are exceeded.
Intrusion Detection System (IDS)
We use an IDS to monitor network traffic for suspicious activity and act upon alerts that indicate potential security threats.
Network Segmentation
Our network is segmented based on the type of services and sensitivity of information it handles to minimise the risk of unauthorised access and lateral movement in the event of a breach.
Remote Access Encryption
Our production systems can only be remotely accessed by authorised employees via an approved encrypted connection (VPN).
Vulnerability Management
We maintain a Vulnerability Management program to proactively identify security vulnerabilities affecting our systems, networks, and applications. Through periodical scanning and patching, and with the support of our Bug Bounty Program, we reduce the risk of vulnerability exploitation.