Security

Security is more than just creating a secure application - it involves constant monitoring, improving and staying vigilant against all risks.

The security of the information you put into Lets Achieve is very important to us and we take this responsibility very seriously. We focus on keeping content secure at all steps in the application rather than simply at edge points. We use physical, technical and procedural safeguards to preserve the integrity and security of your information. Here are some of the measures we take to prevent data leaks and unauthorized data access:

Physical security

All of Lets Achieve’s servers are hosted in secure, SAS 70 audited data centers.

Defense in Depth multi-level data security

We use a series of defensive mechanisms that are layered in order to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors.

Secure application development

Lets Achieve follows best practices in all areas of application security and prevents common web attack vectors. When you enter information into Lets Achieve, we use secure socket layer (SSL) technology to encrypt the transmission of your data to our servers, which helps protect your data.

Network security

All servers are firewalled to permit the minimum traffic necessary to run the service, and access to those servers is limited to Lets Achieve employees with a legitimate business need.

Data reliability

Lets Achieve continuously replicates your data between physical locations to prevent data loss. Additionally, Lets Achieve stores regular backups and has the ability to perform point-in-time recovery for more granular data recovery. Lets Achieve uses Amazon and Azure servers to manage all user data. These servers provide us with the ability to do point-in-time recovery of our entire data

Vulnerability scans

Lets Achieve performs weekly internal vulnerability inspection at all potential points to identify security holes.

Security audits

Annual third party SOC 2 security audits by third party to ensure security of your data.