Skip to main content

Data and Systems Security Overview

Learn about Loop measurements regarding data and systems security.

J
Written by Juan Sebastian Franco
Updated over 3 months ago

1. Infrastructure Security

We use leading cloud and hosting providers in geographically diverse locations to ensure high availability and resilience against attacks. Our network and services are hosted within virtual private clouds (VPCs), with firewalls and denial-of-service (DoS) mitigation tools to protect against common threats.

Key Measures:

  • Network Segmentation: Services are separated into VLANs or VPCs according to function, ensuring minimal cross-service access.

  • Encrypted Communication: All data transferred within our environment uses SSL/TLS encryption.

  • High Availability (HA): Redundant systems and load balancers help maintain service continuity.

2. Compliance and Certifications

Our main cloud provider holds internationally recognized certifications such as ISO/IEC 27001:2013 and SOC1 Type II. These certifications confirm that established security controls and best practices are in place to protect hosted data. We also conduct periodic external audits to validate ongoing compliance with relevant standards and regulations.

3. Application Architecture

Our core applications use a microservices or serverless approach, with separate databases for transactional and analytical workloads. We also maintain:

  • Time-series databases for metrics and logs.

  • Full-text search systems for quick data retrieval.

  • Data lake with automated replication.

  • Regular backups stored securely in multiple geographic regions.

4. Continuous Security Monitoring

We deploy 24/7 monitoring across all production environments. Critical systems are tracked with real-time alerts that notify our on-call team if suspicious activity or performance anomalies occur. Security patching is carried out promptly in line with best practices to minimize vulnerabilities.

5. Data Protection Policy

Our data protection policy forms part of our overall privacy policy, available here. We also follow the guidelines and audits required by industry organizations such as the NAI (Network Advertising Initiative), undergoing annual reviews to meet strict data protection standards.

6. Cloud Hosting and Privacy with Third Parties

We partner with trusted data center and cloud providers. Under these agreements:

  • Ownership of Data: Our company remains the owner of all user data stored within the infrastructure.

  • Access Restrictions: Providers do not access stored data unless legally required to do so by governmental authorities.

  • Privacy Agreements: Privacy and data processing agreements are available on each provider’s official website.

7. Monitoring Tools and Alerts

We employ two monitoring systems to track:

  • Hardware Resources: CPU, RAM usage, disk space, and network throughput.

  • System Functionality: Service uptime and error rates.

  • Potential Vulnerabilities: Intrusion detection and port scanning alerts.

Severity-based notifications are sent to our support team via multiple channels, triggering different escalation procedures as needed.

8. User Access Controls

Platform Access

  • Only authorized users with valid credentials can access our platforms.

  • Roles and permissions are assigned according to business needs and regularly reviewed.

Server Access

  • Production and staging environments are reachable only through secure VPN tunnels.

  • Individual SSH keys or credentials are issued per user, rotated every six months.

9. Company Devices

All company-issued devices use full disk encryption by default. Employees must log in with secure passwords (rotated every six months) and, if available, biometric authentication.

10. Backup and Disaster Recovery

We maintain backups both on-site and off-site. All backup archives are encrypted, ensuring data remains protected if transferred or stored outside the production environment.

11. Offboarding Measures

When an employee or contractor leaves the company:

  • Access Revocation: VPN, server, and application credentials are disabled immediately.

  • Equipment Handling: Company-owned devices are returned, wiped, or repurposed according to internal procedures.


Conclusion

By combining certified cloud providers, secure network architecture, ongoing monitoring, and strict internal policies, we protect customer and business data from unauthorized access or breaches. If you have any questions about our security practices, please contact us at [Security Contact Email].

Did this answer your question?