eBanqo offers a highly secure experience with different security protocols. Our technology has no security concerns that are different from other systems. We have made our priorities the availability of our platforms without interruption and the protection of your information. We have also put in place external and internal systems which are under constant security monitoring. There are also various controls and comprehensive policies in place which are in line with global standards like ISO27001.
Purpose and Objectives
eBanqo is committed to the integrity of her information and implements measures through the establishment, implementation, maintenance and continual improvement of an information security program to protect the organization’s informationScope
eBanqo’s Information Security Policy is to provide a security framework that will ensure the protection of Information from unauthorized access, loss or damage while supporting the open, information-sharing needs of our partners or users.Application
Any external party dealing with eBanqo no matter what her status is, such as employee, customer, contractor, or consultant (by way of example only) (“user”), must comply with our Information Security Policy. All users shall comply with this policy and exercise a duty of care based on best practices in relation to the storage, processing, and or transmission of our information and information systems.
Upon access to our information and or information systems, you acknowledge and confirm the acceptance and consent to this policy.
We may amend this policy at any time by updating with a revised version on our platforms or site. The revised version will be effective after publication.
Policy
This information security policy states management’s commitment and establishes the primary framework and foundation from which all our information security related policies are framed.
eBanqo’s Top Management is committed to implementing Information Security Management (“ISMS”) based on International best practices and international standard ISO 27001:2022. We will further comply with applicable legal, regulatory and contractual requirements related to information security in our services and operations.
We welcome interested parties’ comments on the enforcement of the policy and the policy itself.
Audit and Monitoring
Our systems provide full audit capabilities through event logs and event-based reporting. Our critical infrastructures are configured to generate and send alerts in cases of high utilization which aid events and network monitoring.
Security Policies
We have comprehensive policies that guide the different aspects of our business.
Email Controls
eBanqo emails have been configured to reduce the risk of domain infringement and spamming: SPF, DMARC, MTA-STS, use of attachments, message quarantines etc.
Role-Based Access Control
Our solution provides an approach to restricting system access to authorized users only with full log and tracking.
Vendor Management
To serve our clients, we connect to 3rd party providers that are massive on the global scene. Companies like Google, Amazon, Meta, Zendesk, Freshdesk, Twitter, Zoho, HubSpot, etc.
Server Administration
Our servers are residence in a virtual private cloud with network access control lists (ACLs) that prevent unauthorised requests from getting to our internal network.
Controls and Measures
eBanqo utilizes for its systems amongst others; AES Encryption technology, Firewalls. Multi-Factor Authentication for its systems, SSL protection and password protection. Web Application Firewall rules are implemented for DDoS prevention and Key Rotation is performed periodically.
Incident Management
eBanqo has a rigorous incident management process for security events that may have effect on the confidentiality, integrity or availability of systems or data. This process specifies courses of action, procedures for notification, escalation, mitigation and documentation. eBanqo’s security incident management program is structured around the NIST guidance on handling incidents (NIST SP 80061).
Vulnerability Scanning and
Assessments
Annually, we employ the services of third-party agents to carry out penetration testing on all our platforms. This is in addition to the continuous static testing performed on all projects using code scanners to enforce best practices. Quality Assurance processes, software security reviews and external audits are also used to find other type of issues which are remediated before release to public users.
Data Access and Protection
We have designed requirements for access provisioning, modification and removal; employees are granted access to systems based on the least privilege principle. We keep ourselves updated through routine security awareness trainings to stay updated about the latest trends in the InfoSec world and how to safeguard what has been entrusted upon us. We also regularly review our processes to make sure that we only store the information we need to serve you better.