5 ways Memsource keeps your data safe and secure

Memsource保持数据安全的5种方法

2021-02-25 01:00 Memsource

本文共796个字,阅读需8分钟

阅读模式 切换至中文

5 ways Memsource keeps your data safe and secure Creating the best possible translation platform is not just about designing an intuitive user interface for linguists, or adding more robust automation features for project managers. A key factor for any software developer today is ensuring that the platform and the user’s data remain secure. Memsource takes digital security seriously. According to the Czech statistical office, approximately 16.5% of businesses in the Czech Republic have reported having their IT services disrupted by a malicious attack, with about 9.2% suffering significant data loss. In the US the Internet Crime Complaint Centre records an average of 1,200 reports every day, with an estimated total loss of 3.5 billion USD due to cybercrimes in 2019 alone. As more users and businesses have moved online during the pandemic these numbers are expected to grow. It is clear that digital security is more important than ever before. In this article we would like to highlight five ways that Memsource strives to keep your data secure and safe. Information Security Management System The key to security is having a comprehensive plan. At Memsource we have an Information Security Management System (ISMS), which is a set of policies that cover all processes related to security of our service, the data of our customers, and our internal systems. The benefits of having a centralized and holistic approach to security are clear: keeping your platform secure is not just about one single good practice, or one single employee. It requires the collective effort of all Memsource employees. Since 2014 our security system has been certified with the ISO 27001 international standard. We are also compliant with legislation on personal data protection, which includes both GDPR and CCPA. Continuous Security Process We consider security to be an integral part of all our processes. All our employees familiarize themselves with the ISMS during security awareness training at the start of their employment and subsequently at regular intervals. Some safety policies are specific to certain positions. For instance, our developers follow a set of secure coding practices to ensure that they write safe code. All code is thoroughly tested for errors and vulnerabilities in the testing and pre-production environments, using both human and automated evaluation, before it becomes available to our customers. Security reviews Having a plan is not always enough. People make mistakes and can, either through negligence or by chance, introduce new safety risks. To counter this we are continually working on improving our cyber resilience and finding potential vulnerabilities. This requires a proactive approach: besides our annual ISO 27001 audit, we also conduct frequent internal audits to ensure our risk assessment, security policies, processes and tools are always up to date with current threats. Although our digital world is continuously creating new and surprising threats it’s also important to cover the basics: a recent audit found that one door at the office was potentially breachable, so we changed the lock. To achieve maximum objectivity of security review we also work with third parties to assess effectiveness of our systems. This includes not just the externally managed ISO audit, but also penetration testing of key components of Memsource and a vulnerability disclosure programme (VDP). Since our VDP programme has been launched, independent security researchers have identified numerous vulnerabilities, the vast majority of which were fixed within 24 hours. Data Protection Keeping our customer’s data secure and confidential is a key priority for us. Here are three key principles we observe: Access to data is driven by the principle of the least privilege, which means that it is only used when it is absolutely essential for the completion of a specific task. Additionally we always ask our customers for permission when access to their data is needed for support purposes. All the data in Memsource is encrypted both at rest and in transit. In the unlikely event that a malicious third-party would access this data, it would be exceptionally difficult for them to decrypt it. All customer data is safely stored in the cloud. Backups are created at regular intervals and frequently tested to ensure easy recovery even in case of catastrophic failure. Disaster Recovery Plans No cyber security system can ever be considered fully secure, especially when faced with new and unanticipated security threats or the possibility of human error. Therefore it is important to also have contingency plans that help deal with catastrophic failures. As a part of the ISMS, Memsource has a number of specific plans to deal with serious incidents that may disrupt service, which include not just cybersecurity threats, but also hardware failure, environmental disasters and more. Disaster recovery plans are tested in a number of different ways, which include mock rehearsals, where disasters and responses are simulated, to live failover tests, where normal operations are briefly disrupted.
Memsource保持数据安全的5种方法 创建最好的翻译平台不仅仅是为语言学家设计一个直观的用户界面,或者为项目经理添加更强大的自动化功能。当今任何软件开发人员的一个关键因素是确保平台和用户的数据保持安全。 Memsource非常重视数字安全。根据捷克统计局的数据,捷克共和国约16.5%的企业报告其IT服务因恶意攻击而中断,约9.2%的企业遭受重大数据丢失。在美国,互联网犯罪投诉中心平均每天记录1200起举报,仅2019年一年,网络犯罪造成的损失估计就达35亿美元。随着更多的用户和企业在流感大流行期间转移到网上,这些数字预计还会增长。 显然,数字安全比以往任何时候都更加重要。 在本文中,我们将重点介绍Memsource努力保持数据安全的五种方法。 信息安全管理系统 安全的关键是有一个全面的计划。 在Memsource,我们有一个信息安全管理系统(ISMS),这是一组策略,涵盖了与我们的服务,客户数据和内部系统的安全相关的所有流程。采用集中的,整体的安全方法的好处是显而易见的:保持平台的安全不仅仅是一个好的实践,或者一个员工。它需要所有Memsource员工的集体努力。 自2014年以来,我们的安全系统已通过ISO27001国际标准认证。我们亦遵守有关保护个人资料的法例,包括GDPR和CCPA。 连续安全过程 我们认为安全是我们所有进程的一个组成部分。我们的所有员工在开始工作时,以及随后定期进行的安全意识培训中,都熟悉了ISMS。 有些安全政策是特定于某些职位的。例如,我们的开发人员遵循一组安全的编码实践来确保他们编写安全的代码。所有代码都在测试和预生产环境中进行彻底的错误和漏洞测试,使用人工和自动评估,然后才能提供给我们的客户。 安全审查 有计划并不总是足够的。人犯错误,可以通过疏忽或偶然,引入新的安全风险。为了应对这一问题,我们正在不断努力提高我们的网络复原能力,并发现潜在的漏洞。 这需要一种积极主动的方法:除了我们每年的ISO 27001审核外,我们还进行频繁的内部审核,以确保我们的风险评估,安全政策,流程和工具始终与当前的威胁保持一致。尽管我们的数字世界正在不断地制造新的,令人吃惊的威胁,但也必须注意基本情况:最近的一次审计发现,办公室的一扇门可能会被攻破,所以我们换了锁。 为了实现安全审查的最大客观性,我们还与第三方合作评估我们系统的有效性。这不仅包括外部管理的ISO审计,而且还包括对Memsource关键组件的渗透测试和漏洞披露方案(VDP)。自从我们的VDP方案启动以来,独立的安全研究人员已经确定了许多漏洞,其中绝大多数在24小时内得到了修复。 数据保护 保持客户数据的安全和保密是我们的首要任务。以下是我们遵守的三个关键原则: 对数据的访问是由最小特权原则驱动的,这意味着只有在对完成特定任务绝对必要时才使用它。此外,当出于支持目的需要访问他们的数据时,我们总是征求客户的许可。 Memsource中的所有数据在静止和传输过程中都是加密的。在恶意第三方访问这些数据的可能性不大的情况下,他们要解密这些数据就会异常困难。 所有客户数据都安全存储在云端。备份定期创建并频繁测试,以确保即使在灾难性故障的情况下也能轻松恢复。 灾难恢复计划 任何网络安全系统都不能被认为是完全安全的,尤其是在面临新的和未预料到的安全威胁或可能出现人为错误的情况下。因此,重要的是,也有应急计划,以帮助处理灾难性的故障。 作为ISMS的一部分,Memsource有许多具体的计划来应对可能中断服务的严重事件,这些事件不仅包括网络安全威胁,还包括硬件故障,环境灾难等等。灾难恢复计划以多种不同方式进行测试,包括模拟演练(模拟灾难和应对措施)和实时故障转移测试(正常操作短暂中断)。

以上中文文本为机器翻译,存在不同程度偏差和错误,请理解并参考英文原文阅读。

阅读原文