T-Host IT Security Practices Statement
At T-Host IT, safeguarding the integrity, confidentiality, and availability of our clients' data is a top priority. We maintain formally defined information security policies and procedures to ensure that robust standards are consistently applied across all services we deliver.
Our practices are designed to provide transparency, resilience, and trust for every client engagement.
Infrastructure and Hosting Security
- Services are hosted in secure, redundant data centres with biometric access control, 24/7 surveillance, and fire prevention systems.
- Network resilience is ensured through DDoS mitigation, firewall protection, and redundant connectivity.
Platform and Server Security
- All servers are securely provisioned and patched regularly.
- Remote access is restricted to authorized personnel, with strict firewall rules in place.
- Daily backups are maintained, with retention policies ensuring recovery capability.
Application and Development Security
- Secure coding practices are followed in all development projects.
- Applications undergo regular testing, including penetration assessments.
- Web Application Firewalls (WAF) protect against malicious traffic and vulnerabilities.
Data Protection and Privacy
- Customer passwords are stored using strong one-way encryption methods.
- Payment transactions are processed securely via accredited third-party providers; no card data is stored locally.
- Email services enforce SSL encryption and are continuously scanned for malware and spam.
Monitoring and Incident Response
- Critical services are monitored 24/7 to ensure availability and rapid detection of anomalies.
- Documented incident response procedures guide containment, investigation, and remediation of security events.
- A dedicated Trust & Safety function oversees abuse prevention and account protection.
Commitment to Continuous Improvement
- Our security practices are reviewed regularly to adapt to evolving threats.
- We align with industry best practices and the Trust Service Principles (security, availability, integrity, confidentiality, privacy).
- Transparency and accountability remain central to our approach.
T-Host IT is committed to delivering secure, reliable, and trustworthy services. By maintaining robust governance and continuously improving our practices, we ensure that client data and services remain protected at all times.
Our security practices are reviewed regularly to adapt to evolving threats.
