Back to Trust Center

Incident Response

Our approach to monitoring, detecting, and responding to security incidents.

Continuous Monitoring

Our infrastructure is continuously monitored for security events and anomalies. We employ:

  • Automated security alerting systems
  • Log aggregation and analysis
  • Network and application-level monitoring
  • Anomaly detection for unusual access patterns

Response Process

When a potential security incident is detected, we follow a structured response process:

1

Triage

Assess the scope, severity, and potential impact of the incident.

2

Containment

Take immediate action to contain the incident and prevent further damage.

3

Eradication

Remove the root cause of the incident and address vulnerabilities.

4

Recovery

Restore systems and services to normal operation with enhanced monitoring.

Customer Notification

If an incident affects Customer Data, we will:

  • Notify affected customers without undue delay
  • Provide information about the nature and scope of the incident
  • Describe the steps taken to address the incident
  • Provide recommendations for any actions customers should take

Post-Incident Review

Following every significant incident, we conduct a post-incident review to:

  • Document lessons learned
  • Identify improvements to our security controls
  • Update response procedures as needed
  • Implement preventive measures