Security Management

Security is a vital component of every digital solution, at every stage of development. Beginning with concept and planning we structure the project with data and technology security in mind. During each stage of development we ensure code is written and structured in a maintainable way, and with ongoing support we keep the technology suite up to date to keep your system secure.

Get peace of mind with the best online security possible. Security of your customer data is a serious responsibility so make sure you know what is needed to keep it safe.

Security Penetration

Run Penetration testing to get a report of any system vulnerabilities your system may be exposed to. Work through ensuring your system is a safe as possible from malicious attacks.

Password Security

A leading cause of hacking is insecure user passwords. Set up minimum password complexity requirements, and prompts to regularly review and reset passwords.

Two factor Authentication

Set up two factor authentication (2FA) to improve account security. Using a mobile app to access a Google Authenticator code, or receiving a SMS code will mean they need a second point of authentication to sign in.

Environment Management

A secure and stable hosting environment is part of any security strategy. Ensure servers and third party services are configured to support the needs of your system.

Automated Backups

Automated backups provide peace of mind that your data, and your users data is being kept safe should your system be compromised or corrupted. Backups mean that if the server goes down we can get the system up and running quickly in another environment if needed.

Error Monitoring

Error monitoring tracks system errors as well as user errors to help provide visibility to the development team if an error occurs. Error tracking is a must for complex systems but can help with troubleshooting on any sized project.

GDPR Compliance

General Data Protection Regulation (GDPR) effects that data of any users living within the EU. These new standards have quickly been adopted by a wide range of global businesses to ensure user data remains safe and protected.

ISO Compliance

International Organization for Standardization (ISO) compliance is when a business follows the ISO rules and regulations. ISO 27001 relates to information security management, clients may also have ISO standards specific to their own industry niches.

Database Design

Database design is an important part of any plan to scale a project. By being aware of the long term feature roadmap of a solution we can design the database as structured or unstructured and design it in a way in which it can easily grow and adapt to change.

Infrastructure design

Infrastructure includes the project technology suite. Typically a project will have three controlled environments; dev, staging, live. A project may use a separate server for the database, and another for file storage, this isolates system risk. Other infrastructure tech could include CDNs, caching, load balancers, and server provisioning scripts.

CI and Code Deployment

We use continuous integration processes to deploy code updates throughout the life of our projects. Work is actioned first locally, then deployed to staging for testing, and tested and approved features are deployed to the live environment for users to begin using.

Want to know any more information about what solutions we can put together? Get in touch to discuss working with Fish Vision's expert team to turn your project idea into reality.

 

Get in Touch