We secure all data and authentication protocols. We planned to test the robustness of our applications via functional audits as part of a continuous improvement process.
Our servers are hosted in European datacenters, all traffic is encrypted, and the database is regularly backed up.
Our technical teams are authorized to operate. They are trained to best confidentiality and security practices. We limit access to data to authorized persons only, and only by necessity.
With 1 overall score and 7 thematic scores,
find out where your strengths lie and where you need to improve, in just 5 minutes.
Your results are strictly confidential and will only be shared at your request.
The best cyber advice, use cases and self-assessments to help you improve your cyber skills or to benefit from the services of an expert CISO on a timeshare basis. Directly to your inbox.
You can unsubscribe at any time.
Guaranteed spam-free.