The pillars of our security practices are Encryption of data in transit, Encryption of data at rest, Infrastructure security, Application security, Vulnerability scanning and patching, Application access, Penetration testing, continuous security training of our personnel and Access control to our critical systems.