Governance & Compliance
Vulnerability Management
How We Protect the Platform and Respond to Security Incidents
We take security seriously. Our systems are designed to prevent breaches — but if one occurs, we act fast to contain and resolve it while keeping you informed.
Incident Response Plan
- Prepared Protocols – A documented response plan outlines how we detect, contain, and resolve security incidents.
- Compliance-Driven – We follow the Notifiable Data Breach scheme and relevant privacy laws.
Breach Notification
- Timely Updates – If your data is affected, we notify you without delay.
- Clear Communication – Notifications explain what happened, what data was involved, and what’s being done.
Penetration Testing
- Internal Assessments – Our technical team conducts regular penetration tests against our platform, including web applications, APIs, and infrastructure components, using industry-standard tools and methodologies.
- OWASP-Based Methodology – Testing is guided by the OWASP Top 10 and includes checks for authentication flaws, injection vulnerabilities, misconfigurations, access control issues, and more.
- Risk-Based Remediation – Any identified issues are triaged by severity and resolved promptly. We maintain internal records of findings and remediation actions.
- Part of Ongoing Security Posture – Penetration testing is integrated into our broader security process alongside code reviews, automated vulnerability scans, and patch management.