CanSurround secures data with the following practices:
- All data is encrypted in transit and at rest.
- All systems are developed using secure development practices and tested for security best practices by internal testers and external penetration testers.
- All systems are patched and scanned regularly for known vulnerabilities.
- Intrusion detection systems are implemented with activated event logging and alerts, to ensure attempted attacks are properly addressed and receive immediate response.
Additionally, all security controls are audited routinely against best practices and remediated as necessary.