We have a comprehensive TrueDialog Cyber Security Program focusing on our policies, operating procedures, employee training, and technical protection & controls. We regularly update our program as we advance our technology and the threat environment changes. This program covers critical areas such as Access Control, Privacy, Risk Management, Data Protection, Software and Network Technical Protections, and Incident Management and Response.
We utilize a 24/7 Security Operations Center staffed with TrueDialog cyber security engineers who monitor our technology services with a suite of proprietary and commercial cyber security technologies. Endpoint monitoring, access attempts, and deep analysis of our network and internal device logs are all part of our team’s monitoring, alerting, and response duties.
We have cyber security tools installed on all of our endpoints, networks, computes, and storage devices. These defensive tools constantly watch for and alert us on any potential threats. Should any threat be detected, our TrueDialog Security Operations Center blocks the source and triggers the automatic deployment of tools to eradicate any remnants and permanently seal off the access method.
We further run an extensive set of deep scanning tools both inside and outside our perimeter to detect vulnerabilities in our platform components and software. These vulnerabilities are prioritized by risk, remediated by our technology team, and applied to our production environments.
We leverage Microsoft’s multi-layer security technology by hosting our technology environment in the Azure Secure Cloud. TrueDialog security controls are built into the processing infrastructure and Microsoft’s threat protections are all part of the TrueDialog technology environment.
First, know that we take all steps to protect against TrueDialog breaches and data disclosure with the above aspects of our Cyber Security program. There are further aspects of our program that are confidential due to the nature of today’s global threat environment.
If a TrueDialog breach or data disclosure should occur, we have an incident response team and procedure that is activated in real-time. The breach source will be shut off and contained by our team and technologies. We then immediately notify our clients and the appropriate regulatory agencies. Regular communication will happen proactively to report status and detailed information as required by the type of the breach or disclosure. Will we continue to work with our clients until all aspects of the breach are addressed.