At Quickly, security is our top priority. We are committed to protecting your sensitive business information and ensuring that your data is handled securely and in compliance with industry standards. Here’s a summary of how we protect your data:
Our Commitment to Security
We implement stringent security controls across all aspects of our technology, including:
Software Development
All our software is built in-house by a dedicated team of engineers, allowing us to maintain high-security standards from development to deployment.
Internal and Web-Application Networks
We have robust network controls in place to protect the confidentiality and integrity of your data.
Data Management
Quickly ensures your data remains secure, compliant, and inaccessible to unauthorized parties at all times.
How We Protect Your Data
We take several measures to ensure your payment and business data is secure:
Daily Backups
Databases are automatically backed up hourly and retained daily across multiple zones, protecting you from data loss, corruption, or theft. These backups are tested semi-annually to ensure they can be restored when needed.
Data Storage
Business data is logically separated from other businesses, ensuring that no one else has access to your data. Any access by authorized Quickly staff is logged for added security.
Encryption
All sensitive business information, including bank accounts and credit card numbers, is encrypted using AES-256-GCM. We do not store CVV, PIN, EMV, or mag stripe data, further protecting your financial details.
Data in Transit
We secure your data while it's in transit using TLSv1.2 and strong encryption protocols. Outdated protocols (SSLv3, TLSv1.0, TLSv1.1) are excluded to ensure your information’s integrity and confidentiality.
etwork Security
Quickly operates in a closed, Virtual Private Network (VPN) environment to ensure that access to our systems is secure and isolated.
Firewalls and IDS/IPS
Our platform is protected by firewalls and Intrusion Detection and Prevention Systems (IDS/IPS). These systems monitor network traffic for abnormalities or malicious activity. If suspicious behavior is detected, our systems respond immediately to protect your data and alert our security team.
Regular System Updates
Our servers and network appliances are regularly updated. Critical patches are applied immediately to address any newly discovered vulnerabilities.
Service Uptime and Reliability
Quickly strives for maximum uptime, ensuring that our systems remain available to you at all times. We use redundant virtual environments and industry-best practices to deliver high availability and resilience.
Authentication and Access Control
To protect access to Quickly’s systems, we enforce strict authentication and access control protocols:
VPN Requirements
All internal access to Quickly’s systems must go through a secure, VPN-encrypted connection.Multi-Factor Authentication (MFA)
We require MFA for access to sensitive systems, adding an extra layer of security to user logins.Defined User Roles
Role-based access controls ensure that only authorized personnel have access to specific data and systems.Comprehensive Logging
All access and activity within our networks are logged, giving us a clear trail of actions and allowing us to investigate any suspicious activity.