Skip to main content
We take security seriously. Our systems are designed to prevent breaches - but if one occurs, we act fast to contain and resolve it while keeping you informed.

Incident Response Plan

  • Prepared Protocols - A documented response plan outlines how we detect, contain, and resolve security incidents.
  • Compliance-Driven - We follow the Notifiable Data Breach scheme and relevant privacy laws.

Breach Notification

  • Timely Updates - If your data is affected, we notify you without delay.
  • Clear Communication - Notifications explain what happened, what data was involved, and what’s being done.

Penetration Testing

  • Internal Assessments - Our technical team conducts regular penetration tests against our platform, including web applications, APIs, and infrastructure components, using industry-standard tools and methodologies.
  • OWASP-Based Methodology - Testing is guided by the OWASP Top 10 and includes checks for authentication flaws, injection vulnerabilities, misconfigurations, access control issues, and more.
  • Risk-Based Remediation - Any identified issues are triaged by severity and resolved promptly. We maintain internal records of findings and remediation actions.
  • Part of Ongoing Security Posture - Penetration testing is integrated into our broader security process alongside code reviews, automated vulnerability scans, and patch management.
I