Security Practices
Data Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256.
Access Control
Role-based access controls and multi-factor authentication protect all systems.
Monitoring
24/7 security monitoring and automated threat detection systems.
Infrastructure
Hosted on SOC 2 compliant infrastructure with regular security audits.
Our Commitments
Regular security assessments and penetration testing
Secure software development lifecycle (SDLC)
Employee security training and awareness programs
Incident response and disaster recovery plans
Vendor security assessments for third-party services
Compliance with industry standards and regulations
Security Reporting
Security Vulnerabilities
If you discover a security vulnerability, please report it to security@yorkcoders.com. We appreciate responsible disclosure.
Response Time
We aim to acknowledge security reports within 24 hours and provide regular updates on our investigation.
Recognition
We recognize security researchers who help us improve our security through responsible disclosure.
Questions About Security?
Contact our security team for any concerns or inquiries.
security@yorkcoders.com