Security at LeadsTerra
At LeadsTerra, we prioritize the security and privacy of your data. Our comprehensive security program is designed to protect your information at every level of our infrastructure and services.
Infrastructure Security
Our infrastructure is built on industry-leading cloud providers with robust security controls.
- •Distributed denial-of-service (DDoS) protection
- •Regular security patches and updates
- •Redundant systems across multiple availability zones
- •Continuous infrastructure monitoring and alerting
Data Encryption
We implement encryption throughout our systems to protect your data both in transit and at rest.
- •TLS 1.2+ for all data in transit
- •AES-256 encryption for data at rest
- •Secure key management practices
- •Regular rotation of encryption keys
Access Controls
We implement strict access controls to ensure only authorized personnel can access sensitive systems and data.
- •Role-based access control (RBAC)
- •Multi-factor authentication (MFA) for all staff
- •Principle of least privilege
- •Regular access reviews and audits
Security Monitoring & Incident Response
We continuously monitor our systems for suspicious activity and have a comprehensive incident response plan.
- •24/7 security monitoring
- •Automated threat detection
- •Detailed security logging and analysis
- •Documented incident response procedures
Compliance
We adhere to industry standards and regulations to ensure the highest level of security.
- •GDPR compliance
- •Regular security assessments and penetration testing
- •Vendor security assessment program
- •Security awareness training for all employees
User Security Best Practices
We recommend the following security practices to enhance the security of your LeadsTerra account:
- •Use strong, unique passwords
- •Enable two-factor authentication when available
- •Regularly review account activity
- •Keep your devices and browsers updated
Vulnerability Reporting
We take security vulnerabilities seriously and appreciate the security community's efforts in helping us maintain a secure platform.
If you believe you've found a security vulnerability in our service, please report it to:
Please include detailed information about the vulnerability and steps to reproduce it. We'll acknowledge receipt of your report within 48 hours and provide updates as we investigate.
Contact Us
If you have any questions or concerns about our security practices, please contact us at:
We're committed to addressing your security concerns promptly and transparently.
Last updated: April 6, 2024