PRAIORITIZE regards information security and data protection as top priorities. Here are four examples.
Microsoft Azure
Praioritize runs on Microsoft's award-winning Azure platform. Azure is Microsoft's public cloud platform. Azure offers extensive services, including platform as a service (PaaS), infrastructure as a service (IaaS), and managed database service capabilities. Everything in Azure is secured with encryption by default. Many network encryption options are available to provide additional security for network data. Azure Active Directory is a cloud-based directory and identity management service built for applications in the cloud.
Praioritize functionality
If managers leave their laptops on the train from work, there is a security risk that criminals might access the computer, browse through the email, and then find an access link to a Global Virtual Consultant. Therefore, it's always required to log in to access a Global/Group Virtual Consultant. To access a Global Virtual Consultant, that person must be registered in the Workspace where the assessment has been placed. The user must log in to access a Group or Personal Virtual Consultant. Praioritize verifies if the email address has been assigned (to a Group Virtual Consultant) or whether a respondent with that email address has been entered by a respondent. For security reasons, a confirmation code is sent to that email address, which the user must copy/paste in order to proceed.
ISO 27001
ISO 27001 is the international standard for information security. It helps organizations avoid potentially costly security breaches. ISO 27001-certified organizations can show customers, partners, and shareholders that they have taken steps to protect data in case of a breach. Its framework requires organizations to identify information security risks and select appropriate controls to tackle them. Those practices are outlined in Annex A of ISO 27001, which contains 114 controls divided into 14 domains.
Every year, PRAIORITIZE undergoes an ISO 27001 audit. An ISO 27001 audit is a review process that ensures your organization's information security management system (ISMS) aligns with the most recent best practices defined by the ISO/IEC 27001:2013 guidelines.
Penetration tests
Internal and external (ethical) hacking specialists periodically try to discover security vulnerabilities and recommend mitigations.