Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Do you have policies and controls in place to manage IT infrastructure?
Note we do not host servers ourselves, so we do not have to worry about the hardware aspects of the IT infrastructure. On the software side of the IT infrastructure, we have an Anti-Malware Policy,...
-
Do you monitor logs?
We use DataDog as a tool for the purpose of gathering and monitoring logs. Automatic emails are sent out to system administrators in case certain thresholds are hit that could impact performance or...
-
Do you perform backups and restore exercises?
Yes, on a regular base we test the backup and restore functionalities.
-
Are backups securely stored?
Backups are securely stored on another server that is not publicly accessible and only used for backup purposes. This backup server remains in another data center. The backup is compressed en confi...
-
Do you have a data/services recovery and restoration according to the criticality of the applications?
Yes, recovery services are in place, and the most critical applications get restored first.
-
What operating system(s) is/are leveraged by the system(s)/application(s)?
Our servers run on Linux Ubuntu.
-
How do you ensure all emails are scanned for viruses?
We use GSuite internally at DESelect, which scans all emails and their attachments for viruses.
-
Is physical access to your premises restricted by the use of access control technologies- such as keypads, smart cards or key code access?
Yes, it is, both our offices and the data center that hosts the DESelect services.
-
Are there enhanced security measures such as additional locks in areas where content is stored (e.g. server room, machine room)?
Yes. There are advanced security measures in the data center hosting the DESelect servers. In the office, we also have a locker for confidential information.
-
How will you protect data from physical and environmental threats or from unauthorized access?
Physical threats: All information sits in the cloud in highly protected data centers. Unauthorised access: Access to our customers' data is limited to an absolute minimum of competent employees a...