Encryption and Resource Access

  • End-to-end 256 bit HTTPS SSL encryption
  • All non-essential ports and external network interfaces blocked by default
  • No financial data or credit information is stored in any Leadiro system
  • All account passwords are stored as one-way hashes
  • All client-side communication, sessions, and input are validated server-side
  • All media assets are securely encrypted on Amazon S3 using signed URLs
  • All account data is encrypted and securely stored in Amazon Datasets
  • All data is backed up in multiple remote data centres distributed across the world
  • In the event of server failure, all critical systems have redundant fail-overs to prevent service disruptions

Source Code

  • We perform static code analysis of all production code
  • We have Integration and Unit tests for all critical systems
  • All sub-dependencies have been vetted for security and performance issues
  • All sub-dependencies are directly bundled into the Leadiro application
  • We follow strict compliance with source code licensing and open-source licensing

Key Management

Leadiro maintains a strict policy for assigning and distributing keys which may access any production or development systems.

  • Master access keys are never distributed to any employees
  • Access keys are never stored in any version control system
  • Access keys are never stored anywhere as plain-text
  • Individual access keys are generated per employee with developer only access

Secure Workstations

  • All company workstations and laptops use encryption for storing of any potentially sensitive data
  • All company workstations and laptops use anti-malware and antivirus software
  • All client data is always anonymised for development purposes

Employee Awareness

  • All Leadiro employees have been instructed on best practice security standards
  • Leadiro employees are granted granular role access to resources
  • Any employee access to sensitive data is tracked and monitored
  • Developers only work with anonymised data

Data Loss / Security Breach

In the event of a loss of data or potential security breach, you will be contacted immediately and be kept updated in real-time as Leadiro assesses the situation. Leadiro will quickly take any measures necessary to secure and recover your data. A full incident report will be made available by Leadiro should any incidents occur.

Did this answer your question?