Security is a vital component of every digital solution, at every stage of development. Beginning with concept and planning we structure the project with data and technology security in mind. During each stage of development we ensure code is written and structured in a maintainable way, and with ongoing support we keep the technology suite up to date to keep your system secure.
Get peace of mind with the best online security possible. Security of your customer data is a serious responsibility so make sure you know what is needed to keep it safe.
Run Penetration testing to get a report of any system vulnerabilities your system may be exposed to. Work through ensuring your system is a safe as possible from malicious attacks.
A leading cause of hacking is insecure user passwords. Set up minimum password complexity requirements, and prompts to regularly review and reset passwords.
Two factor Authentication
Set up two factor authentication (2FA) to improve account security. Using a mobile app to access a Google Authenticator code, or receiving a SMS code will mean they need a second point of authentication to sign in.
A secure and stable hosting environment is part of any security strategy. Ensure servers and third party services are configured to support the needs of your system.
Automated backups provide peace of mind that your data, and your users data is being kept safe should your system be compromised or corrupted. Backups mean that if the server goes down we can get the system up and running quickly in another environment if needed.
Error monitoring tracks system errors as well as user errors to help provide visibility to the development team if an error occurs. Error tracking is a must for complex systems but can help with troubleshooting on any sized project.
General Data Protection Regulation (GDPR) effects that data of any users living within the EU. These new standards have quickly been adopted by a wide range of global businesses to ensure user data remains safe and protected.
International Organization for Standardization (ISO) compliance is when a business follows the ISO rules and regulations. ISO 27001 relates to information security management, clients may also have ISO standards specific to their own industry niches.
Database design is an important part of any plan to scale a project. By being aware of the long term feature roadmap of a solution we can design the database as structured or unstructured and design it in a way in which it can easily grow and adapt to change.
Infrastructure includes the project technology suite. Typically a project will have three controlled environments; dev, staging, live. A project may use a separate server for the database, and another for file storage, this isolates system risk. Other infrastructure tech could include CDNs, caching, load balancers, and server provisioning scripts.
CI and Code Deployment
We use continuous integration processes to deploy code updates throughout the life of our projects. Work is actioned first locally, then deployed to staging for testing, and tested and approved features are deployed to the live environment for users to begin using.