Security Incident Management Process

We acknowledge that there is always margin for error. We want to be proactive in detecting security issues, which allows us to address identified gaps as soon as possible to minimise the damage.

We aggregate logs from various sources in the hosting infrastructure and makes use of a log management tool to monitor and flag any suspicious activity. Alerts have been set when an unexpected event takes place. These alerts are triaged, investigated further, and escalated appropriately. 

Our customers are encouraged to report suspected security incidents through our Service Desk.  

In the event of a serious security incident, together with external subject matter experts – we will investigate the incident and drive it until closure.