Security Statement
The steps I take to protect the sensitive data of my clients and customers.
My devices have:
Encryption
Device encryption ensures that hackers will not have access to anything stored on my devices, including sensitive documents, client information etc.
Automatic Locking
I always lock my devices if they are left unattended for even the shortest period of time. They are also set to automatically lock if idle for a short period of time.
Regular Updates
Keeping my devices updated with the latest security patches and upgrades ensures that they are much better protected and not vulnerable to common exploits.
Secure VPN
Using a virtual private network guarantees that data I am sending and receiving is encrypted, preventing people from snooping on me.
My personal logins are:
Unique
Using unique passwords for each login ensures that if any of my accounts are compromised, the same password won’t allow access to any of my other logins or website accounts.
Strong
Strong passwords contain many characters, upper and lowercase letters, numbers, symbols and have no ties to personally identifiable information nor dictionary words.
Secured
Two-factor authentication (2FA) adds an extra layer of security on top of my passwords. It ensures that anybody logging into my account is really who they say they are.
Efficient
My password manger allows me to safely generate and store strong, unique passwords for the websites and tools that I use to run my business and service my clients.
Secure services
Due to the nature of my work, some customer data lives in the cloud. Where necessary to protect my clients, I only use established services with strong security policies.

Google G Suite

ActiveCampaign

Asana

Contacts+

Zapier

Panda Doc

Lucidchart

Pipedrive

Xero
This website is protected by:
Digital Security
Specialist security monitoring services ensure that this website and all other hosted apps and services are monitored 24/7 for vulnerabilities and attacks.
Physical Security
My web host’s data centres are protected with several layers of security including 24/7 security teams. Server room access is limited to certified employees.
Regular Updates
Keeping my devices updated with the latest security patches and upgrades ensures that they are much better protected and not vulnerable to common exploits.
SSL Encryption
All data transfer is encrypted in transit and access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.