Technical & Web Services
Security Protocols
Your security and data protection are non-negotiable for us. Maintaining the security and confidentiality of your project-related data is our top priority. We’ve worked with thousands of companies over the world since 2008 and we have never experienced a breach or loss of customer files. This means that security is ingrained in everything that we do.
Confidentiality First
All U.S.-based W-2 employees, bound by strict confidentiality agreements and trained in secure data handling.
Multi-Factor Authentication (MFA)
Authenticator apps, not SMS codes can be used to protect every system login.
Secure Access & Encryption
All project management files are served over HTTPS (SSL). Access is role-based, logged, and limited to approved team members only.
Proven Reliability
Data is backed up in real time, with database snapshots every few seconds. You always have peace of mind that your data is safe and recoverable.
Compliance & Standards
SSAE16-audited data centers, bcrypt password hashing, and routine permission and security reviews.
Database Security
Passwords stored only with bcrypt (hashed + salted).
Multiple-line SQL execution disabled.
SQL injection protections at every level.
SEcurity
Technical Safeguards
Beyond our technical protocols, we take a proactive, layered approach to protecting every client environment we touch. Security isn’t something we “add on” — it’s embedded into our daily operations, our employee training, and every workflow we design.
- Application Security
⚫ Query/form parameter checking to block SQL injection.
⚫ XSS filters to prevent cross-site scripting.
⚫ Integrated permission system to stop unauthorized access.
- Server Setup
⚫ High-security SSL used for all logins.
⚫ Routine OS and middleware security patches.
⚫ Strict password rotation and access controls.
⚫ Two-factor authentication, IP restrictions, and firewall protections.
⚫ Debugging limited to registered IPs.
⚫ Execute permissions disabled to prevent malicious uploads.
- Testing & Monitoring
⚫ Continuous monitoring of global threat alerts.
⚫ Security attempts flagged via error reports sent to developers.
⚫ Penetration testing tools (e.g., SQLPowerinjector).
⚫ QA team API regression testing.
- Hosting
⚫Servers located in secure facilities with limited personnel access.
⚫ Firewalls restrict all traffic except for essential ports.