Security: It Matters.

We know how important security is. We will never let you down.

At entrustIT, we take your information security very seriously. That’s why we invested to obtain and maintain ISO 27001 accreditation and why all European customer data is stored in UK based datacentres, with their own ISO 27001 certification. European customer data never leaves UK shores, ensuring compliance with EU data protection laws.

Download our Cyber Security White Paper

But security isn’t just about data storage; data access is even more important.  All entrustIT cloud services are encrypted, including our flagship Hosted Desktop and Hosted Application products and we strictly enforce unique username/password controls with complexity, reuse and longevity standards designed to the highest standards.

For more demanding environments (local government, legal, financial services or other highly regulated sectors) we provide two-factor authentication; via a smartphone application or using SMS text messages to a pre-approved device.

entrustIT - a safe pair of hands.

We put our expertise into words and created a helpful White Paper which offers simple, practical advice for those looking to protect themselves from cyber threats. Read More in our FREE White Paper >>

Download our Cyber Security White Paper

Interested in Security? You might be interested in these...📖

What You Should Do If Your Business Is Hacked...

read more

The Worst Data Breaches Of All Time... 

read more

How To Make A Password That Doesn't SUCK...

read more

8 Email Security Tips You NEED To Know... 

read more

5 Ways To Prepare Your Staff For A Cyber Attack... 

read more

These are just some of the steps we take to keep your data safe; and your organisation secure and compliant:

  • 24×7 CCTV surveillance at our datacentres and within our offices.
  • Restricted list of authorised employees with access to customer systems
  • Redundant/resilient power supplies at every datacentre
  • Redundant/resilient Internet connectivity at every datacentre
  • At least two datacentres available to each customer to provide standby and failover options
  • System access, passwords and confidential information restricted to appropriately trained staff.
  • User account passwords never available to our staff ,in the event that maintenance on a user account is required a pre-agreed customer password will be set and the user forced to change password again on next logon.
  • Departing users have their passwords reset and accounts disabled within 30 minutes of notification.
  • Logical and physical segregation of Customer applications, configuration and data
  • Redundancy and resilience incorporated within our system architecture; no single points of failure.

We post regular Cyber Security tips in our blog! Sign up to receive updates > >

Subscribe