Never compromise on data security.

We protect your data as if it were our own. We ensure customers’ data is robustly and rigorously safeguarded with our ardent approach to data protection.

Audited security controls

Multi Factor Authentication
(MFA)

Multi-factor authentication (MFA) is a security measure that requires two or more proofs of identity to grant you access.

Protection against brute
force attack

We use different methods to prevent brute force attacks including MFA, reCaptcha or limiting login attempts.

reCaptcha to authenticate
user login

reCAPTCHA is a CAPTCHA system that enables web hosts to distinguish between human and automated access to websites.

We are registered with the Information Commissioner Office

The ICO is the UK's independent body set up to uphold information rights. Our ICO registration number is: ZA764177
We take information security seriously and have put in place robust rules and procedures to ensure the protection of our sensitive information.This summary outlines our approach to information security, and provides an overview of the guidelines that our employees, contractors, and third-party vendors must follow to maintain data security

The purpose of our Information Security Policy is to establish clear guidelines and procedures for our employees, contractors, and third-party vendors to ensure that all information assets are protected adequately.

This policy outlines the classification of information assets, access controls, data encryption, information handling, incident response, compliance, enforcement, and review and revision of the policy. All employees, contractors, and third-party vendors must comply with this policy, as well as all applicable laws and regulations related to information security. Failure to comply with this policy may result in disciplinary action, up to and including termination of employment or contract.

We are committed to maintaining a strong information security posture and protecting our organization's sensitive information from all potential threats. To achieve this goal, we need the cooperation of all our stakeholders. We encourage everyone to take the responsibility of protecting our information assets seriously and follow this policy at all times.