Security and Trust
We handle and manage vast amounts of data for our clients. This includes details of numbers called, call recordings and, where clients are using our lead management tool, we're holding all their customer information as well. As a result we are very careful and conscientious about how we handle this highly sensitive and valuable data.
How do we do this?
Physical Security
There is physical security in place in each location we have our equipment to host services; This includes secure buildings, strict access control policies, card entry systems, CCTV and security staff on site all year round.
Remote Access Security
All remote connections to our services are protected by some or all of the following:-
- Username/ Password
- Allowed IP addresses
- Encryption
- Automatic blocking of suspicious IPs
External Stress Testing
We don't just leave it there. as part of holding the We have contracted an external security company. They are a specialist security company who mounts cyber attacks on our systems to evaluate their robustness. This happens each month. If there happen to be any weaknesses then we are alerted and we resolve them. This results in our systems being awarded a certificate stating that we are PCI compliant. The certificate we hold is for the Payment Card Industry Data Security Standard (PCI DSS). It's designed to protect businesses and their customers against payment card theft and fraud.
The Human Element
All these steps are all well and good, but what about the human element? We are a small specialised business and as a result the few people who have access to our systems have been fully scrutinised by us.
Our business is supplying telecommunications services, and we would not benefit if we didn't respect our customers' data. In fact we wouldn't have made it this far had we not done this. We have built this business on word of mouth since 2009.