How do you detect and respond to security incidents?

Last updated: December 11, 2025

We maintain a documented Incident Management process:

  • Detection: Through logs, monitoring tools, intrusion detection, and anomaly detection.

  • Reporting: Staff must immediately report suspected incidents to our Incident Response Team.

  • Response: The team performs containment, eradication, and recovery steps; verifies system integrity; and monitors for re-occurrence.

  • Communication: We notify affected customers as required and coordinate external communications in line with legal/regulatory obligations.

  • Post-incident review: We do post-mortems, update controls, and keep detailed records for audit and compliance.