Security

We understand that when a firm uses accounting, bookkeeping, payroll, or taxes services, a lot of sensitive data must be exchanged. Client data security and confidentiality are highly important to us.

Work Station & Network Security

  • We use Microsoft Server Architecture.
  • Restricted access to authorized personnel only.
  • Protected by a high-level antivirus solution and Fortigate Firewall.
  • Removable storage devices are not allowed on workstations.
  • We are moving towards a paperless environment, which is both environmentally beneficial and ensures data security.
  • Unauthorized email and cloud storage systems are prohibited.
  • Users are not permitted to utilize personal email accounts. Access to a variety of websites is limited and monitored.
  • Each workstation has trackers installed. Every 15 minutes, a screenshot of an employee’s PC is taken.
  • Static IP Based Data Transfer Facility via SSL Protected FTP Servers based in the US.

Data Security

  • Our firm complies with all GDPR requirements. We use sophisticated software, hardware, and dedicated servers to ensure complete financial data security.
  • Our facility is ISO 9001 and ISO 27001 certified for best systems of Information Security Measures.
  • We own a Dedicated VPS server for secured Data Transfer.

Physical Security

  • 24*7 CCTV surveillance throughout our facility to monitor and secure our work environment.
  • Access control system at the workplace entrance to allow only regulated access to production areas.
  • The server room is password-protected, and only the IT crew is permitted to enter via access card.
  • CD R/W drives are not available on workstations.
  • The facility is also monitored by security guards.
  • USB ports on workstations have been turned off.
  • Document storage areas are well protected.

Employee Credibility

  • Employees are recruited after rigorous background checks.
  • All employees sign non-disclosure and non-compete agreements. All raw and processed data is destroyed after work completion.
  • Only a few people have access to sensitive information.
  • The trackers on workstations provide continuous monitoring.
WhatsApp