logo
close-icon
  • Industries
  • Testimonials
  • Contact us

Full safety and security of your data

Full safety and security of your data

Data and information these days are power and consequently, precious. When your data is vulnerable, it also makes you vulnerable. In fact, it is not erroneous to say that the accounting and bookkeeping data has always been sensitive and hence, it is often protected as dearly as life itself.

When you decide to partner with Aone Outsourcing Solutions, we completely understand your concern for the privacy and security of your data. High stakes are involved. As a professional accountant or as a public account firm, you are handling data from different clients. Small breaches can setup a chain reaction. Not just yours, but the stakes of your clients are also involved.

We provide multiple levels of security to your data once it leaves your office and becomes accessible to us.

We would also like to make it clear that the data breaches happening on your side are not under our control and hence, when such breaches occur, in no way we can be held responsible. If you feel your data may be vulnerable to attacks or breaches, kindly consult a data security expert.

Image
How does Aone Outsourcing Solutions protect your data privacy?
Below we give you some details.

Secure cloud server

All our data exchanges happen through cloud storage over a private cloud powered by Vmware Vcenter Cloud in a CtrlS Tier 4 Datacenter. What does that mean?

This is the most advanced type of data center tier. It is an enterprise class data center with redundant and dual powered instances of servers, storage, network links and power cooling equipment.

Which further means, if something bad happens, if a certain aspect of the data center is breached or made vulnerable, the other copies of data immediately become available to the genuine users. It suffices to say that your data exists in multiple versions and if one version is compromised, the other versions instantly become available for download and processing.

Also, your data on the servers remain in an encrypted form and can only be decrypted by authorized keys available to only authorized people.

Additionally, our cloud hosted service is certified by AICPA, SOC, ISO 27001: 2013 and ISO 9001:2015

All our cloud services are monitored by our IT team 24 x 7. KMS encryption is applied to the client data that is stored on our server and also when the data is being exchanged between client servers and our servers – we assist the clients with these security measures. Further, we also establish site-to-site VPN services to provide our clients better services compared to our competitors.

All our employees use two-layer authentication to access our systems and subsequently, their accounts.

Secure cloud server

Remote Work

Strict do's and don’ts for remote work

Many employees these days prefer to work from home, especially during the pandemic times. Aone Outsourcing Solutions has also enabled our indigenous Business Continuity Plan (BCP) to provide our services non-stop during lockdowns to you, and also to sustain employment for our employees.

When our accountants, bookkeepers and financial advisers are working from home, they are constantly accessing data from our servers.

This access is provided only through a VPN (Virtual Private network) and cannot be accessed through the normal Internet connection. Also, we allow our workers to work from home only when there is bad weather or when the movement is not possible due to the pandemic or a sociopolitical situation.

Aside from these we have also taken the following security measures to make our processes impenetrable:

  • Allowing work from home only during exceptional situations
  • Security audit of all our servers every six months by conducting vulnerability assessment and penetration testing to make sure that we provide an unimpeachable security and privacy to our clients
  • CCTV cameras at all important locations in our office
  • Biometric authentication for critical access and mobility within the office
  • Strategic mobile phone restrictions
  • An IT team that is available 24 x 7 for monitoring, security, and troubleshooting
  • Blocking of social media websites
  • USB, pen drives and other detachable hard drives disallowed
  • Internal recruitment and comprehensive background verification and background check before hiring
  • Tightknit employee-employer agreement about nondisclosure and data security