From online banking to e-commerce, digitisation rules the world, and the one device we use to access it all is a smartphone. Thus, it comes as no surprise that mobile applications are often the focal point for cybercrime. This is why web application security measures are being enforced in full force across the globe.
Web application security involves implementing various processes that protect apps and servers from Internet-based threats. This is crucial as it helps protect valuable customer and business data from cybercrime attacks.
As part of the digital lending ecosystem that values data privacy, Fibe strives to ensure your protection every step of the way. Continue reading to understand the data security practices we implement, and the best practices you can follow to further secure yourself.
1. Hosted on a Virtual Private Cloud on Amazon Web Services, we ensure that you get access to reliable and secure services.
2. Our Defence in Depth Architecture helps leverage multiple security measures to secure your data, such as web application and network firewalls, content delivery networks and a DDoS protection layer.
3. Our 3-Tier Architecture enforces some of the best industry practices that allow you to use our app stress-free.
4. With a host of security features, including intrusion detection, intrusion prevention, anti-malware, anti-virus and file integrity monitoring systems, the data you enter on Fibe stays secure.
5. The critical management services we implement ensure that only the data team gets access to company data.
6. You don’t have to be worried about unauthorised access to stored data as we encrypt data at multiple levels.
7. With our data replication and automated snapshotting features, you can rest assured of the resiliency and durability of data.
8. The process related to Change Management that we have deployed provides you with a secure and reliable experience.
9. Our Incident Management system remediates or escalates any incidents that may arise due to unplanned or planned changes.
10. Our network security system ensures automated and manual vulnerability assessment and penetrating testing to protect data.
11. Skilled CERT-IN auditors at Fibe conduct periodic external security testing and audits.
12. We do not share your personal information with unaffiliated third parties for any purpose without your consent. Learn more by reading our Privacy Policy.
13. We have also fulfilled Data Localisation requirements according to the RBI guidelines, meaning all our data is secure.
14. We are ISO 27001:2013 certified which means that we have implemented the essential Information Systems Management System policies and procedures.
We are committed to protecting your data’s privacy today and tomorrow – and implement state-of-the-art technology to enforce stringent security measures. In addition, our overall security system is designed to protect our systems from cyberattacks and security breaches. If you find a security bug on Fibe products, report it by mailing us at security@fibe.in with a detailed explanation. We will ensure the issue is resolved within the stipulated timeframe.
Work with us to protect yourself from fraud and cybercrime by following these simple tips.
Avoid Sharing Your Banking Details
We or our representatives will never ask for your credit or debit card details, such as your card number, CVV, OTP or even your PIN. So, refrain from giving out such vital information, as this is one of the easiest ways to fall prey to a cyberattack. Likewise, ensure you do not provide these valuable credentials via mail, phone or text. Avoid Initiating Transactions on Remote Access Software Fibe will never ask you to initiate any banking transaction on the app or remote access software like AnyDesk or TeamViewer. Avoid falling prey to such scams, as it is used by hackers to record keystrokes or view confidential data.
Avoid Initiating Transactions on Remote Access Software
Fibe will never ask you to initiate any banking transaction on the app or remote access software like AnyDesk or TeamViewer. Avoid falling prey to such scams, as it is used by hackers to record keystrokes or view confidential data