At Neurosnap, we prioritize security above all else. Our clients entrust us with their most sensitive data, including intellectual property that is critical to their operations and competitiveness. We are deeply committed to honoring that trust by implementing robust security measures with unwavering diligence. Below, we detail our security policies, emphasizing our commitment to protecting our clients' data. For security reasons, we intentionally omit certain details about our security measures to prevent potential adversaries from gaining insights into our defenses. Our goal is to maintain a high level of security without providing a roadmap for malicious entities.
General Security
Neurosnap implements a comprehensive suite of general security measures aimed at minimizing the risk of data breaches and limiting their potential impact.
Measures Taken
- Bank-Grade Encryption: We protect user-sensitive information, such as passwords, with encryption algorithms that meet or exceed the standards used by banks and financial institutions.
- Enforced TLSv1.3 Encryption: All web traffic is encrypted using TLSv1.3, the latest standard in secure communications, ensuring that data in transit is protected against interception and tampering.
- Strict Access Controls: Access to sensitive data and infrastructure is restricted to authorized personnel only, with multi-factor authentication and continuous monitoring to manage and secure access points.
- Encrypted Data Backups: Any data backups are encrypted using highly tested algorithms, ensuring that even backup data remains secure against unauthorized access.
- Strong Password Policies: Our password requirements are designed to balance strength with usability, encouraging secure practices among users and clients.
- Advanced Firewalls: We deploy industry-standard firewall solutions, configured to meticulously monitor and control incoming and outgoing network traffic based on predetermined security rules.
- Proactive Breach Prevention: Our breach prevention policies incorporate leading industry practices, including proactive threat hunting and incident response planning, to prevent and mitigate potential security incidents.
- Regular Security Audits: We conduct frequent internal and external security audits to evaluate and enhance our security measures, ensuring compliance with industry standards and best practices. Additionally, tools added to our platform are also audited with a high degree of fidelity.
- Zero Outsourcing: Outsourcing software development can pose significant risks, frequently resulting in hastily written, low-quality code that may lead to security vulnerabilities and data breaches. We are committed to high-quality software development through strictly in-house operations, upholding this principle to mitigate these risks.
- Timely Software and Security Updates: Our commitment to security includes regular updates to server software and security systems, incorporating the latest patches to address vulnerabilities and enhance defense mechanisms.
Email Security
Email security is a fundamental aspect of our security posture. Recognizing its critical role in safeguarding our communications and data, we adhere to industry-leading practices and standards. We leverage the M3AAWG Sender Best Common Practices Version 3.0 as a foundational guideline for our email security strategy, supplemented by our proprietary research and analysis to further strengthen our defenses.
Measures Taken
- SPF and DKIM with DKIM Rotation: We implement Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM), including regular rotation of DKIM keys, to authenticate our emails and protect against spoofing and phishing.
- DMARC Enforcement: Domain-based Message Authentication, Reporting, and Conformance (DMARC) is enabled to add an additional layer of verification, minimizing the risk of email-based threats.
- DNSSEC Activation: Domain Name System Security Extensions (DNSSEC) are enabled to prevent DNS tampering and spoofing, ensuring that internet users reach authentic websites.
- S/MIME for Email Encryption: Secure/Multipurpose Internet Mail Extensions (S/MIME) technology is used to encrypt emails, ensuring that sensitive information remains confidential during transmission.
- Standard TLS for Outbound Emails: Outbound emails are encrypted using Transport Layer Security (TLS) standards to protect the data in transit.
- Comprehensive Email Monitoring: Both outbound and inbound emails are closely monitored for unusual activity, enhancing our ability to detect and respond to threats promptly.
Neurosnap's security measures are continuously reviewed and updated in response to evolving threats and advancements in security technology. Our dedication to protecting our clients' data is unwavering, as we strive to maintain the highest standards of security and trust.