Summary

🟢 Smarter AI 🟢

Comprehensive Measures

We implement a comprehensive set of security measures to protect all users.

These measures include:

  • OWASP compliance, data encryption, and security best practices built-in

  • 24/7 server monitoring: Continuous oversight of server performance and availability

  • Firewall protection: A barrier against unauthorized access and attacks

  • Advanced security modules: Such as mod_security and Suhosin hardening, designed to intercept malicious requests

  • Anti-malware protection: On endpoints and servers to safeguard against malware

  • Dedicated internal Security team: To provide expert security support

  • Internal policies and procedures: To support information security

  • Continuous scan for vulnerabilities: Regular checks to identify and mitigate potential issues

  • Responsible Disclosure Policy & Bug Reward Program: Encouraging users to report security issues

  • Applied OWASP secure coding practices: Following industry standards for coding security

  • 2FA authentication: Enabling two-factor authentication for added security

  • Database encryption: Using secure hashing algorithms to protect sensitive data

  • Regular data backups: Ensuring data protection and recovery in case of data loss

  • Continuous static code analysis: Detecting potential code security issues These measures are part of our commitment to providing a secure and reliable hosting environment for our users

WAF

We implement an advanced web application firewall (WAF) that blocks malicious traffic like SQL injection and cross-site scripting.

The WAF is part of its security features and is also available through our CDN.

How we implement WAF:

  • Server-level: our web and cloud hosting use hardware firewalls and other security measures. Additionally, our servers include a built-in WAF

  • ModSecurity: This open-source WAF is enabled by default

  • CDN: Our CDN adds an extra layer of protection by diverting malicious requests away from the origin server

What the WAF protects against:

  • SQL injection and cross-site scripting (XSS) attacks

  • DDoS attacks

  • Zero-day attacks

  • Bots

Data integrity

  • All operating systems are kept up to date, including security patches

  • Database encryption with secure hashing algorithms

  • Regular data backups

  • Continuous static code analysis to detect potential code security issues

Certifications

  • Our hosting is ISO/IEC 27001

  • As for Health Insurance Portability and Accountability Act, our hosting services provide a HIPAA-compliant environment according to our Hosting Agreement

  • Our sites are TrustedSite certified

  • Our sites are VirusTool certified

Last updated

Was this helpful?