GetBusy products and services adhere to the highest industry standards for security. You can use our products and services with confidence, safe in the knowledge that we use the same security methods and principles as the most diligent of institutions such as government bodies and financial institutions.
We have teams of experts using the latest technologies and best practices to ensure that our products are, and remain, safe and protected so you can use them worry free.
Security of our products and services, including how they are designed, built, tested and worked on, and by whom, are our highest priorities. We are proud to be ISO27001 certified in relation to our UK developed products: WORKIRO, Virtual Cabinet and Virtual Cabinet Portal.
All data in transit across all of our products and services, outside of your own network, is encrypted as well as certain customer content data, such as documents, which are encrypted at rest.
We use infrastructure and services provided by Amazon Web Services (AWS). AWS, like us, treat security as their highest priority. AWS documentation on the security of their infrastructure and services is comprehensive and can be found here https://aws.amazon.com/security/
Specific details about physical and environmental security and network architecture can be found in their white paper AWS: https://bit.ly/21ph425
At a minimum, we conduct regular penetration testing of all our products and services via specialist independent and industry accredited third party penetration professionals. For our WORKIRO, Virtual Cabinet, Virtual Cabinet GO, and Virtual Cabinet Portal products, as well as our non-product operations in the UK, we adopt Continuous Offensive Security ("COS"). COS ensures that our products and operations are under continual but controlled attack from specialist third parties based on the latest attack vectors, moving well beyond point-in-time penetration testing practices.
We leverage the best that AWS has to offer to provide high levels of availability, redundancy and scalability.
We have tools and processes as well as a dedicated Security and Compliance staff to ensure that we stay on top of all Data Protection Requirements, and we actively monitor regulatory guidance and interpretations of key Data Protection requirements to make sure we're well informed and doing the right things in the right way.