Were you affected by the Heartbleed virus? Although the numbers of people negatively impacted are still being accounted for, many of us received password reset requests from large institutions like banks, online stores, and subscription services where we regularly do business.
Over the last 10 years, software has steadily moved to the “cloud”. With this great convenience comes the occasional reminder that systems aren’t always perfect 100% of the time.
At Radiant, the security of our customers’ confidential data is a key priority. Our applications leverage the most complete data security protocols to ensure secure data transfer and storage for our customers. Following are just some of the assurances our hosted customers can rely on:
- Production systems are hosted on Amazon EC2 in a VPC environment
- Database systems are never directly accessible for external systems or users
- Intrusion Detection System (IDS) is employed to monitor connections in the application environment
- Authorization checks are performed for all actions that create, read, update, or delete data
- Application credentials such as API keys are generated manually
- SSL is utilized on all network connections
- Privileged operations (admin, operators) are logged
- Confidential data such as passwords are always stored encrypted
- Backups are stored off-site
We will always strive to offer our customers the latest, most secure software and hardware. That being said, if “password” is your password, you may want to visit the Google Safety Center for a quick refresher on maintaining personal security in today’s cloud.
Ready to learn more? Tell us a little about your asset tracking and management challenge, and we will follow up.
Last Updated on April 21, 2022 by Radiant