For data in transit, we use best practices of using HTTPS encryption. For data at rest we store it using encryption. In addition, our data has cross regional disaster recovery capabilities.
We leverage third party penetration testing and automated Vulnerability scanning to ensure product security. As well, by following our principles we continuously improve and choose best engineering practices.
We strive to be trustworthy and leverage the best security practices available. Click here to view our page on Privacy.
If you would like to know more, then please contact [email protected] with security or privacy in the subject line.