Menu Top left content

Security Policy

Security for you and your services are paramount, that is why SingHost has developed a set of practices to help ensure that your account, and all the data within it, is secure. Our security practices spans into five different areas
  • Physical Security
  • Network Security
  • Server Security
  • People Security
  • Redundancy and Business Continuity.

Physical Security

Our datacenters are highly-secured facilities that are located in areas with no history of natural disasters such as earthquakes, fires, floods, etc. The datacenters are also protected by industry-grade fire prevention and fire control systems.  

Network Security

SingHost protect your websites and data against sophisticated attacks. The following is just an intentional partial, generic description of our full network security practices. If you require further details on our network security, please get in touch with us.

Server Security

As with our network security processes, our server security is tightly regulated. The following is not an exhaustive list of processes that we follow to ensure security on our servers.
  • Hardened & Updated OS: Operating systems are always updated and hardened for security, minimising any potential vulnerabilities
  • Virus & Malware Scanning: Viruses & malware are scanned for and detected using daily updated virus-scanning protocols

People Security

We focus not just on the technology but on people as well. Policies about escalation, management, and daily operations are well-defined to manage security risks.
  • Authorisation: Only employees with the required clearance have access to specific servers and racks in our datacentre
  • Restriction: Only employees who need access to customers’ data (such as for troubleshooting) are given passwords and keys. Any access is logged and passwords are strictly controlled
  • Auditing: Regular audits are conducted on our processes and reviewed by management

Redundancy and Business Continuity

One of the core principles of our network and infrastructure design is redundancy, because we know that it is not a matter of if, but a matter of when, that hardware fail. As such, we have designed our network and servers with the following in mind:
  • Data Backups. Data is backed-up regularly across multiple servers, ensuring an up-to-date copy of data even with hardware failures or disasters
  • Power Redundancy: All of our servers come with power redundancy
  • Redundant Network Devices: Our network makes use of redundant network devices, i.e.switches, routers, gateways, to avoid any single point of failure on our network

Additional Information

The areas listed above are brief and generic for security reasons, but we have taken great steps to ensure that our security policies, and architecture are reliable and secure. For more information about our security here at SingHost, please feel free to contact us.