What have you done to prevent security breaches?
Quantium strives towards security best practices and also completes yearly SOC 2 auditing. This is in line with our proactive approach to security risk management. The following are risk examples and Quantium’s risk mitigation approach for each:
Exploitation attacks: These breaches are caused by vulnerabilities in outdated systems. Quantium caters for this by continuous code and version upgrades, while Microsoft Azure employs hosting on up-to-date hardware.
Human error: There are multiple threats of breach that can arise from human error, such as the use of weak passwords, failure to apply security best practices, and lack of awareness about phishing and spoofing attacks. Quantium implements an ongoing policy requiring all employees to complete periodic security awareness training.
Other system related vulnerabilities: Quantium completes periodical penetration tests including OWASP Top 10 Vulnerabilities and Database Vulnerabilities to test and proactively ensure that our system security is up to standard.
Additional measures to note:
Our systems undergo security and compliance monitoring by Vanta, a leading security compliance service provider.
As part of our HR policy, we conduct periodic ongoing training for all Engineering and Client Solutions staff on the latest data security policies and guidelines.
As part of our client servicing initiatives, we conduct periodic training and information updates to our client’s administrators and users on security related topics.