Organizational Security
We value the security of our organization and the information we handle. In line with industry standards and regulations, we do a thorough check on all new team members, followed by annual training and refreshers on security best practices, diving into important topics like managing passwords and keeping data private. Additionally, all employee workstations have built-in safety to enforce full-disk encryption, strong passwords, and automatic locking.
Data Encryption
Safeguarding client data is our top priority. To achieve this, we utilize encryption methodologies that align with industry best practices. Both during data transit and when it's stored, we employ encryption techniques to make sure that the data remains confidential and is resistant to tampering. By doing this, we can confidently say that even if data is intercepted during transmission, it would be unreadable and secure from potential threats.
Client Data Handling
Trust is the foundation of our client relationships. Amplify Reviews has stringent data handling and retention protocols in place. Client data is always treated with the utmost respect and is only utilized for agreed-upon purposes. Once our contractual commitments are met, we ensure data is either safely returned or deleted, maintaining client trust.
Vulnerability Management
We believe in proactive defense. Our routine vulnerability assessments, which are systematically scheduled, help us spot and fix potential weaknesses in our infrastructure. Our trained infrastructure and support team is continuously reviewing the findings of those assessments to ensure vulnerabilities are remediated in a timely manner.
Multi-Factor Authentication
To further bolster data access security, multi-factor authentication is used across all production systems hosting the Amplify Reviews application. By employing this layered security approach, we can ensure that sensitive data remains accessible only to verified individuals.
Backup & Recovery
Understanding the importance of data integrity and business continuity, Amplify Reviews maintains regular backups in geographically dispersed locations. Should any unforeseen data issue arise, our recovery processes are robust and poised to restore data integrity swiftly.
Incident Management
While we always aim for smooth operations, we're also prepared for the unexpected. If a security incident occurs, our trained Incident Response Team (IRT) immediately steps in. They're skilled at quickly identifying, isolating, and mitigating threats to ensure minimal disruption. Regular training ensures that IRT can adapt and respond efficiently to emerging security scenarios.
Secure Coding Practices
Our software development life cycle incorporates secure programming best practices to protect against vulnerabilities. Every alteration to our platform or infrastructure doesn't just pass through human eyes. It's also subjected to methodical automated scans. These measures identify flaws, external library threats, and ensure no hidden secrets exist within our code.
Dedicated Compliance Team
Navigating the global compliance landscape requires expertise, and Amplify Reviews is proud to have a specialized compliance team to lead training, communicate essential changes, and interact with regulatory entities. Our forward-thinking approach and dedication make sure that Amplify Reviews is always in line with compliance standards, solidifying our reputation as a trusted and compliant business partner.