Is system data backed up? If so, where is the backup stored?
Which datacenter will be used to store data?
Does Company report cybersecurity incidents?
Thee organization ensures that every user or process (acting on behalf of the user) has access authorization to information systems based on his/her role and need to know.
Has an information security manager been nominated to hold responsibility and accountability for the protection of EvenFinancial information?
Online Identifier; Internet Protocol Address
Does your company control or maintain additional mobile app(s)?
Do you ensure that security threat detection systems which use signatures, lists, or behavioral patterns are updated across all infrastructure components within industry accepted timeframes?
Do you have a capability to continuously monitor and report the compliance of your infrastructure against your information security baselines?
Do you support secure deletion (e.g. degaussing / cryptographic wiping) of archived data as determined by the ?