We use multiple layers of security controls. The servers are hosted in locked-down premises. The network is protected by firewalls, intrusion prevention and anti-malware technologies. Systems, data and transmissions are encrypted. Access and authorisation protocols are strictly enforced. We undergo independent security tests and audits.
![Stephanie avatar](https://static.intercomassets.com/avatars/1807518/square_128/Steph-1520379722.jpeg)
Written by Stephanie
Updated over a week ago