Data Security

We don’t want you to just take our word for it when we say your data is secure, we want you to understand exactly how, so we decided to dedicate an entire page for you just on this.

design

Reliable & Secure Technology You Can Trust

When you use our services, you’re trusting us with your information. We understand that this is a big responsibility and we work incredibly hard to protect your data. The information you store while using our services is always encrypted, and only you can decrypt it.

myFRP does not have access to your password or your data. We designed our services to protect both, and we work with various organisations and security experts to make sure our services are rock solid.

We can’t see your data, even in case of a data breach! We can’t use it, share it, or sell it. We partner with Microsoft Azure as our Cloud storage provider; the world's best.

secure
security experts

3,500 Security Experts

Azure has thousands of people keeping it safe. That's why it's used by governments and banks around the world.

cyber security

USD 1 Billion Annually on Cyber Security

An incredible amount of funding and resourcing goes into Azure security to keep it safe.

compliance certifications

The Most Compliance Certifications in the Industry

No other Cloud storage provider in the world has as many strict compliance certificates as Azure.

cloud hosting

What exactly is the Cloud?

The 'Cloud' is where we store your data when you enter it into your account. Strangely, it has nothing to do with the fluffy floaty things in the sky.

The Cloud is a secured physical location where data can be saved, usually away from unauthorized personnel. These are physical, highly secured locations. Typically, tall fences made of steel and concrete encompass every inch of the perimeter. There are cameras around the locations, with a security team monitoring their videos at all times. Regular people can’t visit these locations, you must have a valid reason, and you must register your visit in advance and will need to use biometric identification to move around the site, with the security team actively monitoring you and asking you to go through scanners as you move around.

In other words, your data is safer here than on your own stealable laptop.

Security Accreditations

We comply with the most stringent industry standards for data confidentiality, integrity, and availability. Our information security management system meets and exceeds the high standards set by ISO 27001:2013 standard. We are also Cyber Essentials and Payment Card Industry Data Security Standard (PCI DSS) compliant and certified.

ISO

ISO 27001 Certified

PCI

PCI DSS Certified

Cyber Essentials

Cyber Essentials Certified

GDPR

GDPR Compliant

How It Works

Signing In

Apart from your username and password, you’ll need a unique code that’ll be emailed to you every time you try to sign in. This is called Multi-Factor Authentication (MFA) and it makes sure it’s really you.

In Transit

When you’re typing away and your data is being sent to your account, there is a secure virtual tunnel put in-between your computer and the Cloud. This means nobody can see it in transit. This is called Transport Layer Security (TLS).

Keeping It Confidential

All the things you save will be scrambled up and will only re-order themselves when you securely log-in. This means your data makes absolutely no sense without your authentication. This is called encryption.

Security Testing and Controls

Our services are reviewed by multiple independent security firms who are CREST and NCSC Certified who provide penetration testing against services provided by us, secure code review and continuous vulnerability management. We’ve implemented a mixture of cyber security and encryption controls, and some of our core controls are:

• Multi-Factor Authentication (MFA) across all systems.

• ‍Encryption of data at rest and in transit.

‍• Technical Assessment of our systems for vulnerabilities and configuration weaknesses.

‍• Secure Development within a secure development environment, continuous security testing by experienced developers with experience on secure coding practise.

‍• Controlled Access to only approved individuals (deny all access by default).

• ‍Screening of all employees to a minimum of the Baseline Personnel Security Standard (BPSS).

• Data Classification and Handling training for all employees.

• Policies and Procedures on secure operations and configuration of systems.

Ready To Keep What’s Most Important Completely Safe?

Sign up now and get your first 30 days free!

Get a 30-Day Trial