Security
We take security seriously. We have implemented various mechanisms to ensure optimal protection of our customers’ data.
Hosting
We take security seriously. We have implemented various mechanisms to ensure optimal protection of our customers’ data.
Server configuration
We have taken the following aspects into account for our servers:
- All data transfers and communications are conducted over an encrypted channel (HTTPS).
- Our servers have been secured by a competent company (firewall setup, antivirus software, restricted ports, and restricted access per IP for sensitive areas).
- We maintain full access logs for the servers.
- We perform daily automatic backups of the entire database at another data center.
Security through code
- Users can share data only with partners they explicitly select. By default, access to items is denied to everyone.
- Our system is protected against threats such as XSS and SQL injection.
- Access to different areas is carefully restricted based on user permissions.
- We log user access and activities on the platform 24/7.
- We store only irreversibly encrypted passwords.
- We have strict deployment procedures.