Security for you and your services are paramount, that is why SingHost has developed a set of practices to help ensure that your account, and all the data within it, is secure. Our security practices spans into five different areas
- Physical Security
- Network Security
- Server Security
- People Security
- Redundancy and Business Continuity.
Physical SecurityOur datacenters are highly-secured facilities that are located in areas with no history of natural disasters such as earthquakes, fires, floods, etc. The datacenters are also protected by industry-grade fire prevention and fire control systems.
Network SecuritySingHost protect your websites and data against sophisticated attacks. The following is just an intentional partial, generic description of our full network security practices. If you require further details on our network security, please get in touch with us.
Server SecurityAs with our network security processes, our server security is tightly regulated. The following is not an exhaustive list of processes that we follow to ensure security on our servers.
- Hardened & Updated OS: Operating systems are always updated and hardened for security, minimising any potential vulnerabilities
- Virus & Malware Scanning: Viruses & malware are scanned for and detected using daily updated virus-scanning protocols
People SecurityWe focus not just on the technology but on people as well. Policies about escalation, management, and daily operations are well-defined to manage security risks.
- Authorisation: Only employees with the required clearance have access to specific servers and racks in our datacentre
- Restriction: Only employees who need access to customers’ data (such as for troubleshooting) are given passwords and keys. Any access is logged and passwords are strictly controlled
- Auditing: Regular audits are conducted on our processes and reviewed by management
Redundancy and Business ContinuityOne of the core principles of our network and infrastructure design is redundancy, because we know that it is not a matter of if, but a matter of when, that hardware fail. As such, we have designed our network and servers with the following in mind:
- Data Backups. Data is backed-up regularly across multiple servers, ensuring an up-to-date copy of data even with hardware failures or disasters
- Power Redundancy: All of our servers come with power redundancy
- Redundant Network Devices: Our network makes use of redundant network devices, i.e.switches, routers, gateways, to avoid any single point of failure on our network