Cybersecurity in iGEO

In this post, we will talk about iGEO’s security and cybersecurity policies, which are one of the main foundations of our software and to which we devote many resources, both financial and technical. This is something a few know, but that, of course, differentiates us from other programmes.

Since the very beginning, we have been aware of the relevance of safe data storage for those companies working with iGEO. A key decision was to trust since day one in one of the three big clouds; in this case, iGEO is hosted in Google’s, where information is stored using the most secure, trustworthy methodologies.

Cybersecurity: why Google Cloud?

Google is one of the leading companies in Infrastructure as a Service (IaaS), due to the vast number of products it offers. This allows us to implement many innovations that are useful for iGEO’s features, and with the maximum security.

As you all know, iGEO invests in introducing new technology. Hence, we have always been sure about working with a server platform that makes the incorporation of new, powerful developments to our software easy. Given Google’s infrastructure and its constant progress, our development department, along with that of RDI, implements new features through Artificial Intelligence, Machine Learning, Big Data, and other technologies in iGEO.

How are iGEO’s data stored in Google?

Instead of storing users’ data in a single machine, we work with multiple data centres, each of which is set up as a server hive. Thus, data are fragmented into different locations, which complicates accessibility.

In case an intruder intended to reach the information stored in the servers, they would have to surf and hide at the same time across Google’s servers, which would make it truly difficult for them to get any information at all. To hinder this process for any hacker, we encrypt not only all data and communications, but also their fragments as an additional security measure, and store them in different Google servers.

In addition, in iGEO, we have set up firewalls and other security tools that block the access to the information stored in our servers. We invest a significant amount of our financial resources in security.

Updates and backups

While iGEO’s users work with the application at any time of the day, all data are recorded and stored in our different servers. But the most crucial aspect is that backups are automatically performed every hour, which would allow us to recover all data in the event of a disaster. These are stored in different data centres across Europe and the Americas, and we are working for them to be even hosted in the Azure’s cloud, which belongs to Microsoft. Thanks to these backup systems, we comply with several ISO security standards, which are added to the ones provided by Google.

In spite of all, iGEO is the only app, not only in this sector but also in many others, that has complete data transparency. Regarding accessibility, we provide you with a feature within our platform that allows you to download a file containing all your data stored in iGEO. It is essential to have these options available, so that your information is not captive in the software with which you work in the event that you want to stop using it.

For that matter, our helpdesk department will verify who requested to download those sensitive data by following a strict security protocol. This process entails a series of procedures and verifications so that the company’s manager authorises it themself with the highest safety level.

On which aspects does cybersecurity focus?

Cybersecurity may be defined as a practice to defend devices, servers, computers, networks, and data against malware attacks. Next, we will explain the different kinds of cybersecurity that are applied in iGEO to work with Google’s servers:

  • Network security: it protects the system from malware aimed at accessing your network.
  • Application security: it focuses on keeping iGEO’s software free of threats and limits to a great extent the access to the information entered in the app.
  • Information security: it protects data integrity and privacy while storing and transferring them through an encryption protocol.
  • Operating security: it includes customised processes and permissions for each user to access the information stored in iGEO.
  • Data recovering: if, under any circumstances, an attack or procedure causing a data loss occurs, in iGEO we have the possibility to recover them and restore all operations and information that existed before in order to ensure your work’s continuity.

Other advice to reduce the chances of cyberattacks against your equipment

Regarding other security aspects, you as users must adopt certain measures to preserve your equipment’s cybersecurity:

  • Update your operating system: by doing so, you will also profit from the latest security improvements in your work device.
  • Use an antivirus: install this kind of software in your devises so that you are protected against malware and alerted against sites that may jeopardise your work.
  • Change your passwords: iGEO always provides you with credentials at the highest security level. However, it is advisable to change passwords yourselves every so often. To achieve a high security level, you may combine numbers, letters, and symbols.
  • Do not click on suspicious links: in iGEO, we will never request passwords or relevant information via email. Hence, if you receive a suspicious email asking for your credentials, please delete it straight away or, in case of doubt, contact us or the company that is allegedly requesting them.
  • Make sure your Wi-Fi access is safe: sometimes, connecting to an open network may be counterproductive. Therefore, we recommend you to do so only in completely secured spaces. Some open networks, like those in airports, monitor your browsing activity. Even though they don’t have access to your passwords, this is still a clear example of violation of your privacy.

Now you know what cybersecurity is and how to protect it in your daily work. To stay up to date about the sector’s news, please check our blog.


Related news