How do you detect and respond to security incidents?
Last updated: December 11, 2025
We maintain a documented Incident Management process:
Detection: Through logs, monitoring tools, intrusion detection, and anomaly detection.
Reporting: Staff must immediately report suspected incidents to our Incident Response Team.
Response: The team performs containment, eradication, and recovery steps; verifies system integrity; and monitors for re-occurrence.
Communication: We notify affected customers as required and coordinate external communications in line with legal/regulatory obligations.
Post-incident review: We do post-mortems, update controls, and keep detailed records for audit and compliance.