Security overview
We protect your data.
All data is written to multiple disks instantly and backed up daily. Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.
Your data is sent using HTTPS.
Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS. Within our firewalled private networks, data may be transferred unencrypted.
Any files which you upload to BlogAudio are stored and are encrypted at rest. Our application databases are generally not encrypted at rest — the information you add to the applications is active in our databases and subject to the same protection and monitoring as the rest of our systems.
Regularly-updated infrastructure.
Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored.
Constant monitoring
We have a team dedicated to maintaining your account’s security on our systems and monitoring tools we’ve set up to alert us to any nefarious activity against our domains. To date, we’ve never had a data breach.
We also audit internal data access. If a BlogAudio employee wrongly accesses customer data, they will face penalties ranging from termination to prosecution. Again, to our knowledge, this hasn’t happened.
We have processes and defenses in place to keep our streak of 0 data breaches going. But in the unfortunate circumstances someone malicious does successfully mount an attack, we will immediately notify all affected customers.
Have a concern? Need to report an incident?
Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please email us at [email protected] for details on how to securely submit a report.
Adapted from the Basecamp open-source policies / CC BY 4.0.