Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
Are policies and procedures established and mechanisms configured and implemented to protect the wireless network environment perimeter and to restrict unauthorized wireless traffic?
Yes.
-
Do you have a physical security policy in place ?
Yes, please refer to our Physical and Environmental Policy here: https://drive.google.com/file/d/116bcMUTJtqYvnlq065wIz4BDNiznqMBS/view?usp=sharing.
-
Do you encrypt devices holding personal data or confidential information (e.g. laptops, hard drives, USB,…)?
We do not as of yet enforce encryption on all devices (although we do this for portable hard drives, which contain files for Marketing purposes, such as recordings). Do note that we do not actually...
-
Do you use encryption protocols when transferring data? If yes, which ones?
Traffic to and from the DESelect servers is secured through TLS based connectivity. The DESelect service always requires SSL/TLS between the client (browser, mobile apps, ...) and the server. Also,...
-
Do you use at-rest database encryption for data?
Data is encrypted at rest at 2 levels: Production Database Encryption Disk encryption Service instances and the underlying VMs use full volume encryption using LUKS with a randomly generated epheme...
-
Do you have a mean to remotely wipe data on a lost or stolen phone, laptop or similar device?
Yes, we do.
-
Do you have an identity and access management policy in place?
Please find our Access Control Policy here: https://drive.google.com/file/d/1I6yafdcO93I-rV55D9JpdYsqjVgD9nyv/view?usp=sharing.
-
Are factory default account details been changed?
Yes.
-
Do you monitor and review access attempts?
Yes, and amongst others, we have the following safeguards in place: - We use CloudFlare to protect our server from robots / DDOS attacks etc. - Access attempts on our server are logged, and a fir...
-
Is access role based depending on the employee's function?
Yes. Access to all files and systems is carefully considered, only the minimum required access level is given.