Responsibilities

  • You will keep your passwords, phrases and security keys secure and will frequently change such login credentials in order to reduce the risk of brute force attacks.
  • We will follow industry best-practice and fully utilize our extensive experience to ensure that your services are kept as secure as possible at all times.
  • We will routinely perform security checks to verify your identity before acting upon your requests in technical support and other account related tickets. These checks will vary in their nature and frequency depending on the impact of the request, if there is any suspicious activity on your account or if we deem necessary at any other times in order to ensure your account remains protected.

Protection

  • We may provide security devices as part of your service including but not limited to firewalls, intrusion detection and prevention, and denial of service defense designed to protect your service from malicious attacks. Although we will always try to appropriately balance the needs of maximum security and service usability, it may not always be possible to protect your service from every attack. New attacks methods are devised every day, and therefore we cannot guarantee 100% effectiveness of any security device, configuration, or method deployed as part of our service.
  • We can change your password at any time for technical reasons or if we consider your account or subscription is at risk, and can provide you with access again after verifying your identity.
  • We can monitor and perform vulnerability scans on anything hosted on our servers without prior notification as part of our efforts to protect our operations and your services.
  • Our vendor’s datacenter facilities are protected with industry security.
  • We do not guarantee that our web hosting servers are fully PCI Compliant, although we may be fully compliant.
  • We process your payments through third-party vendors that are fully PCI Compliant, such as Stripe and Paypal.
  • We do not provide PCI Compliance scanning. Scanning can be purchased through a third-party vendor.
  • We will not allow customers or untrusted third parties any physical or remote access to any of our critical infrastructure under any circumstances.
  • We are unable to accept responsibility for any losses incurred as a result of any breach of security.