- Shared Responsibility for Security
- Encryption at All Stages
- In Transit: All data transferred between you and our platform is encrypted using TLS (Transport Layer Security) for secure communication.
- At Rest: Data stored on our servers is encrypted using robust algorithms like AES-256, ensuring data protection even in the event of a server breach.
- Strong Authentication and Access Control
- Multi-Factor Authentication (MFA): We highly recommend enabling MFA to add an extra layer of security to your account.
- Granular Access Management: We provide tools to manage user permissions and restrict access to your data, guaranteeing that only authorized individuals can access your information.
- Continuous Monitoring and Auditing
- Proactive Threat Detection: We constantly monitor our infrastructure to identify and prevent potential security threats.
- Detailed Audit Logs: We maintain comprehensive audit logs to track access and activities within the system. This ensures transparency and facilitates investigations in case of security incidents.
- Multi-Layered Threat Protection
- Next-Generation Firewalls: We utilize advanced firewalls to block unauthorized access attempts.
- Intrusion Detection and Prevention: Intrusion detection and prevention systems (IDS/IPS) are in place to identify and stop suspicious activities.
- Regular System Updates: We prioritize keeping all our systems updated with the latest security patches to address known vulnerabilities.
- Backup and Disaster Recovery
- Automated Backups: We perform regular and automated backups of your hosted data to ensure data availability.
- Data Recovery Options: In the event of an incident, we provide data recovery options to minimize downtime and ensure business continuity.
- Alignment with Privacy Policy
- User Responsibilities
- Credential Security: You are responsible for safeguarding your passwords and credentials. Avoid sharing them with anyone.
- Security Configuration: We recommend configuring permissions and access controls according to your specific needs.
- Incident Reporting: If you suspect any security breach or unusual activity, report it immediately to our security team at support@dscloud.pt.
- Security Incident Management
- Notifying affected users within 72 hours of identifying the incident.
- Providing detailed reports outlining the impact of the incident and the corrective actions taken.
- Updates to the Terms of Security
- Contact Us
- Email: support@dscloud.pt
- Website: www.dscloud.pt