Cybersecurity Policy
At Verity Spurt, protecting our customers’ data and transactions is our highest priority. We employ robust cybersecurity controls and defenses to mitigate risks posed by threats like malware, hacking attempts, and cyberattacks. This policy outlines the rigorous measures we take.
Encryption Protocols All data transmitted between your devices and our servers is encrypted using industry-leading Transport Layer Security (TLS 1.3). This protects login credentials and personal information.
Within our databases, sensitive data like account numbers is encrypted at rest using AES-256 encryption.
Authentication We enforce multi-factor authentication (MFA) protocols that require a password/PIN plus a one-time verification code sent to your mobile device to access accounts.
Facial recognition and fingerprint biometrics provide additional authentication factors.
Network Security Our networks are secured by next-generation firewalls, intrusion prevention systems, DDoS mitigation appliances, and 24/7 monitoring by our SecurityOperations Center.
We conduct regular penetration testing and vulnerability scanning to detect and remediate any weaknesses before they can be exploited.
Application Security Our online banking platform and mobile apps are built from the ground up with security best practices like input validation, parameterization, and the latest cryptography libraries.
Rigorous application security testing is performed prior to every release.
Physical Security Customer data is housed in SSAE 16-certified, access-controlled data centers with mantraps, biometric screening, around-the-clock surveillance, and other physical protections.
For disaster recovery and data redundancy purposes, data is replicated across multiple secure locations.
We are compliant with relevant data protection regulations like GLBA and GDPR.
Incident Response We maintain an Incident Response Plan to efficiently manage any suspected cybersecurity events. This covers procedures for:
- Rapid identification and containment
- Thorough investigation and root cause analysis
- Timely notification to customers if personal data was impacted
- Coordination with 3rd parties like law enforcement as needed
- Post-incident review and control improvements
All Verity Spurt personnel undergo cybersecurity awareness training at least annually. We are constantly evolving our safeguards to meet emerging threats head-on.