Cyber-crime is one of the biggest threats we face in our day-to-day lives – especially for those of us who spend a large chunk of our time on a computer.
With cyber-security of paramount importance, our role here at Mortgage Brain is to keep your client’s details safe and secure within our systems. This means that, as a broker, you are able to ensure that your clients have peace of mind throughout the mortgage advice process.
The Key is one of our flagship systems, and it holds a plethora of data about clients within it. So how do we ensure that it’s all kept safe and sound? We run through the security ins and outs for the Key below, so you can rest assured your data is kept safe with us.
How does it all work?
Like many systems nowadays, the Key stores all its data and documentation in ‘the cloud.’ Access to the system is restricted to approved users, supported by extensive configuration around password format and expiry.
There are then two ways in which this information is stored:
Locally stored information
Whilst data is in use and being updated, the Key operates with limited data stored temporarily on the user’s computer. Once the data is uploaded to the server – by saving it or closing the application altogether – this locally stored information is then removed.
Security at this end is where you come in.
Ultimately, the local computer environment remains under the control of the end user. We recommend you only use versions of Windows that are supported by Microsoft, and that they are kept up to date with regular system updates.
We also recommend that the latest anti-virus software is used at all times, as well as strong passwords changed regularly to keep the highest protection on your data.
Server stored information
And this is where we come in. When we are hosting the Key, all server information is hosted with a leading Internet Service Provider within their data centres. These centres are protected by the latest, most sophisticated software as well as high-tech physical security systems – including CCTV, alarms, 24-hour monitoring and dual authentication access controls.
Personal data and documents within the Key are stored on servers with no direct connection to the internet. Access to them is via services hosted on separate, internet-facing servers. Data is also encrypted when it’s not in use, and access is controlled by firewalls that restrict all access other than that required to run the service.
There are also a number of other precautions we have in place, which are:
- Microsoft-supported software
Regular security updates
- Anti-virus software on all servers
We also employ an independent security company who run regular tests against all aspects of our data security. Based on their findings, we make the changes and improvements necessary to ensure that your data within the Key remains secure.
For more information about how we keep your data safe in all our systems, you can take a look at our PDF here.