SECURITY STATEMENT

Entersoft takes reasonable steps to protect our systems and our client information from loss, misuse, unauthorised disclosure, or destruction. Below is an outline of our commitment to protecting customer data, ensuring compliance with regulations, and maintaining cybersecurity best practices.

Our Security Commitment

At Entersoft, we are committed to safeguarding the security and privacy of our customers, employees, and partners. We’ve aligned our cybersecurity practice with the international ISO27001 framework. Our compliance with relevant regulations of the countries we operate in ensures transparency and accountability in how we manage our information systems and client data privacy. These include the Australian Privacy Act 1988, GDPR and the Indian Digital Personal Data Protection Act, 2023 (DPDP Act).

Compliance & Certification

We are proud to have the following Cybersecurity and Information Security certifications:

  • ISO27001
  • Australian Essential Eight

These certifications demonstrate our active commitment to maintaining a robust Information Security Management System (ISMS) to protect sensitive data, maintain confidentiality, integrity, and availability, and to comply with regulatory requirements.

Cybersecurity Measures

Some of our key cybersecurity initiatives include the following:

  1. Strong and Role Based Access Controls: We use multi-factor authentication (MFA) and role-based access to limit unauthorised access and ensure only the right people have access to our client data.
  2. Endpoint Security: Our approach is to secure all devices, including laptops and mobile phones, with antivirus software and regular updates.
  3. Network and Data Security: We employ intrusion detection systems (IDS), and encryption all data at rest to safeguard communications.
  4. Incident Response: We’ve established Incident Response protocols for managing and recovering from cyber incidents.
  5. Employee Training: Our security calendar includes regular cybersecurity awareness programs to keep our team informed about safe computing, phishing and social engineering attacks.
  6. Continuous Security Monitoring: We use technology tools to continuously monitor our systems for security vulnerabilities.

Contact

To contact our team regarding our Cybersecurity approach and current measure, please email our Data Protection Officer at [email protected]. Any questions regarding this policy and our privacy practices should be sent by email to [email protected]