Security 

So many buzz words in Security. Read below to see how we protect your data.

Learn​​ more

Incursion: Not if, but when...

It might sound like a strange statement to start our security page with. But we prefer to assume that at some stage a data breach will occur. So we've designed an implemented our systems and processes to expect an incursion. 

Here you can learn about the steps we've taken to reduce the likelihood of an incursion, and the policies and processes in place to protect your data including best practice encryption, threat monitoring and vulnerability scanning.

Compliance


We are actively working towards ISO27001, SOC2, GDPR and PCI-DSS compliance! We take compliance seriously and we are using industry leading technology platforms to achieve and maintain these goals


Visit our Trust Centre

Privacy by Design


Embedding good privacy practices into process and development ensures that every line of code and every process prioritises the protection and confidentiality of your data. It's not just a feature; it's a fundamental commitment to your privacy.


Read more

Monitoring


Our approach to security reaches beyond prevention. We use cutting-edge tools and practices for continuous monitoring. This proactive approach allows us to anticipate and neutralise security risks swiftly.


Got questions?

Opened eye in a hand

Security Bulletin

Sign up here to get updates on product updates and information about Security from Taco