Back to Trust Center
Incident Response
Our approach to monitoring, detecting, and responding to security incidents.
Continuous Monitoring
Our infrastructure is continuously monitored for security events and anomalies. We employ:
- •Automated security alerting systems
- •Log aggregation and analysis
- •Network and application-level monitoring
- •Anomaly detection for unusual access patterns
Response Process
When a potential security incident is detected, we follow a structured response process:
1
Triage
Assess the scope, severity, and potential impact of the incident.
2
Containment
Take immediate action to contain the incident and prevent further damage.
3
Eradication
Remove the root cause of the incident and address vulnerabilities.
4
Recovery
Restore systems and services to normal operation with enhanced monitoring.
Customer Notification
If an incident affects Customer Data, we will:
- •Notify affected customers without undue delay
- •Provide information about the nature and scope of the incident
- •Describe the steps taken to address the incident
- •Provide recommendations for any actions customers should take
Post-Incident Review
Following every significant incident, we conduct a post-incident review to:
- •Document lessons learned
- •Identify improvements to our security controls
- •Update response procedures as needed
- •Implement preventive measures