Security Practices

Last update: 02-November-2020


We place strict controls over our access to the data you make available for us, we are committed to ensuring that your data is not seen by anyone who should not have access to it. The operation of our services requires that some employees have access to the systems which store and process your data. For example, in order to send newsletters, promotions and updates emails. These employees are prohibited from using these permissions to share user data unless it is necessary to do so. All of our employees are bound to our policies regarding your data, and we treat these as the highest importance within our company.


We use the most powerful and sophisticated system monitoring and logging, Firewalls are configured according to industry best practices and unnecessary ports are blocked.


We regularly patch our hosts and databases and run automatic intrusion detection system on all of our hosts, remediate any findings that present a risk to our environment. All administrative passwords are periodically changed.


In the event of a security breach, we will notify you of any unauthorized access to your data, we have incident management policies to ensure your data protection and handle such event.


We work with Secure Cross Server Replication, enables to encrypt traffic between two servers using an SSL connection. All traffic in the source and destination data centers will be encrypted, to protect your data.