Successful Digital Solutions
We have been providing internet consulting, web development, web design, branding, system integration and many other scalable business solutions for B2B, B2C and B2E since 1998.
Retain: Internet Security
One of the most valuable assets is a company's data, including information about customers, partners and prospects. Application and Internet Security are a key component to ensuring the privacy of customers and the integrity of the business. We take security very seriously and every project is built as a completely secure solution.
Details
At CEONEX we understand that aside from everything else one of the most important issues is the security of your system and your customers'/prospects'/partners' information. That is why, aside from their responsibilities building completely secure solutions, our team is required to spend 10-15% of their day learning and evaluating new technologies and solutions to integrate into our future development and to keep abreast with latest security issues, bugs and solutions to forecast and remedy possible problems before they even become apparent.
There are 2 "zones" where security comes into play.
ZONE1 - The channel of transmission
- The channel where information is being transmitted (phone lines, for example).
- The server, database and any additional functional scripts that access the channel.
The transmission channel is addressed by transmitting confidential information only over a secure SSL connection - which is standard procedure for e-commerce and any other confidential information.
ZONE2 - The server (which is broken down into 2 categories:
- Server software and hardware (for which the hosting company is responsible)
- The database, developed application etc.(for which we are responsible).
As far as our side is concerned, we always take a "Paranoia approach" to any programming we do. Where the unrealistic assumption is made that every single user using our application is a malicious Hacker trying to break into the system.
So the first line of defense is complete and thorough validation and modification of all data entered by a user into any form. Which includes searching for any special characters used to access server information through a posted form. All potentially dangerous symbols and characters are taken out or replaced by harmless characters. Only after that validation and modification is the form sent onto the server for processing.
In addition, access to a higher level of modification of the web site or application is given only to the Administrator of the website, which requires a heightened security authorization process to enter that area of the site each time.
Sensitive files on the server are placed into special hidden folders instead of the root folder, which hides sensitive data even in the event of a security breach.
Also very sensitive information, such as credit card information, is either not stored at all in the database - perhaps discarded after the transaction is completed - or highly encrypted with only last 4 digits viewable.