iCount goes beyond what’s common when it comes to securing our users’ data
It goes without saying that we encrypt every single piece of data. We encrypt it when it’s on its way to us and we encrypt it once we store it in our data centers.
Did you notice that we ask you for three identifying items when you login? This makes it substantially more difficult for attackers to brute force their way into iCount.
iCount uses a state of the art external service that filters all incoming communication and prevents attackers from manipulating potential data to harm our systems.
iCount uses several internal firewalls that we ourselves maintain and control in order to inspect data even after it passes our external WAF. We also use them to control the flow of data between our servers.
We backup your data so you don’t have to worry about it. Some might even say that we have a slight OCD when it comes to backups.
Data is backed up to 11(!) different locations right after you log off from your session.
We have built our system in a way that eliminates any single point of failure. We use three different physical locations to host our servers and replicate the data between all locations in real time. We leverage this not only for increased stability but also for increased speed!
iCount is PCI-DSS level 1 compliant which means that the security standards are exactly the same as the ones that are applied in all the major credit cards companies.