We use multiple layers of security controls. The servers are hosted in locked-down premises. The network is protected by firewalls, intrusion prevention and anti-malware technologies. Systems, data and transmissions are encrypted. Access and authorisation protocols are strictly enforced. We undergo independent security tests and audits.

Written by Stephanie
Updated over 4 years ago