Policies
Security Policy
Is the MobileContractorHQ website and data protected by a Web Application Firewall and network firewall?
Absolutely! MobileContractorHQ prevents attacks with sophisticated monitoring and protections including a high-grade web application firewall and tightly controlled network-level firewalling. In addition, Distributed Denial of Service (DDoS) protectection defends your site from malicious attempts to overload the application with fake traffic.
How is my data protected in data centers where MobileContractorHQ is hosted?
The MobileContractorHQ solution is hosted with the world’s leading data center provider. Access to the data centers is strictly controlled and monitored by security staff, tight access control, and video surveillance. Our data center providers are SOC 2 Type II and ISO 27001 certified and provide N+1 redundancy to all power, network, and HVAC services.
Can MobileContractorHQ respond quickly to new security needs or threats?
Absolutely! Between our streamlined, rapid approach to application delivery and our highly automated server infrastructure, MobileContractorHQ quickly addresses security issues as they arise. These technology and process structures allow MobileContractorHQ to rapidly adapt as new threats are identified.
How does MobileContractorHQ infrastructure detect and prevent attacks?
MobileContractorHQ uses enterprise-grade firewalling, routing, intrusion prevention, and behavior analytics capabilities to protect infrastructure and thwart attacks.
Does MobileContractorHQ rapidly patch and update when vulnerabilities are identified?
Absolutely! MobileContractorHQ and its hosting partners adhere to rigorous patch management to push security updates fast and consistently. In most situations, patching is handled by deploying new server instances with the most up-to-date patches and de-provisioning out-of-date servers.
Does MobileContractorHQ have a continual process for discovering and quickly correcting security bugs?
Absolutely! We test for potential vulnerabilities continuously in all layers of the technology stack. Dynamic application scans, static code analysis, and infrastructure vulnerability scans are run every day, all day. Our Engineering team continually assesses the security of our products to rapidly respond to security bugs.
Does MobileContractorHQ bring in outside third parties to help identify security issues?
Absolutely! We retain industry-respected 3rd party security organizations to test the MobileContractorHQ customer-facing applications and corporate infrastructure. We also have rigorous internal and external audit processes to ensure that processes are implemented and working as intended.