We regularly engage professional ethical hackers to try break into our infrastructure and assess all security aspects.
We use active monitoring tools that ensure all our software code matches the highest security standards.
Our infrastructure is secured behind advanced firewall systems. We also have high-end anti-virus and anti-malware scanning our systems.
We practice two factor authentification. 2FA provides an additional layer of security beyond strong passwords.