The measures we take against potential data breaches
Our service is hosted within AWS and we use the extensive security functionality provided. Any detection of malicious activity is immediately investigated by one of our team members, including a security expert with over 20 years experience in incident management.
Any indication of data loss would trigger our incident response process which includes communication to any impacted parties within 24 hours.
We use:
Amazon Cogito to identify brute force authentications and sham login attempts
CloudTrail to monitor and record API requests
CloudFront for DDoS attack protection
Amazon Inspector to assesses the security of our apps
At Keymate, we take privacy and security very seriously. It has been our principle vision from the start to make this our primary priority.