COMPLIANCE
Security
With a notable escalation in cybersecurity threats over recent years, security is a top priority for us. Our security architecture has been built from the ground up to provide the protection and monitoring necessary for the securing data in today’s environment.
- User and role-based access rights
- Assign enquiry, add or edit access to a user or role
- Multi-factor authentication
- Full auditing of all changes
- Encryption of data in transit and at rest
- ISO 27001 compliant