Network Security Policy

Stockpilot.com Network Security Policy

1. Introduction

At Stockpilot.com, we prioritize the security of our network and the protection of customer data. This Network Security Policy outlines the measures we take to ensure that our network infrastructure is protected from internal and external threats. We implement a range of technologies and best practices to secure our network environment and monitor for potential vulnerabilities.

2. Network Segregation

We use network segregation to protect our internal systems by dividing our network into multiple segments based on functionality, department, or sensitivity of data. This approach minimizes the potential impact of a breach by limiting access between different segments and ensuring that only authorised users and systems can access critical resources.

Key aspects of our network segregation include:
  • DMZ (Demilitarized Zone): Public-facing systems are isolated in a demilitarized zone to prevent direct access to internal systems.
  • Internal Segments: Our internal network is further divided into separate segments to limit exposure of sensitive data across different parts of our infrastructure.
  • Role-based Access Control (RBAC): Network access is restricted based on the user’s role, ensuring only authorized personnel can access specific network segments.

3. Network Protection Measures

We implement a comprehensive suite of network protection measures to defend against unauthorized access and potential security threats:
  • Firewalls: All incoming and outgoing traffic is filtered using firewalls to block unauthorized access and mitigate potential threats.
  • Intrusion Detection and Prevention Systems (NIDS/NIPS): We monitor network traffic for signs of malicious activity using advanced intrusion detection and prevention systems.
  • Virtual Private Network (VPN): For remote employees and secure communications, we enforce the use of VPNs to encrypt traffic and ensure privacy.
  • Anti-virus and Anti-malware Tools: We deploy robust anti-virus and anti-malware solutions across all endpoints to detect and prevent infections before they can spread through the network.
  • Network Monitoring: Real-time monitoring tools track all network activity, including traffic patterns and system health, to detect and respond to potential vulnerabilities or suspicious activities.

4. Continuous Monitoring and Threat Detection

We take a proactive approach to network security by continuously monitoring for potential threats:
  • 24/7 Monitoring: Our network is monitored around the clock to detect anomalies, potential breaches, and other network security risks.
  • Threat Intelligence: We integrate external threat intelligence feeds to stay informed about emerging vulnerabilities and cyber-attacks, enabling us to respond to threats more effectively.
  • Incident Response: We maintain an incident response plan that includes procedures for identifying, isolating, and addressing network security incidents. Any detected security breach is promptly contained and investigated to minimize impact.

5. Compliance with Industry Standards

Stockpilot.com adheres to industry standards and best practices for network security:
  • General Data Protection Regulation (GDPR): We ensure that our network security practices align with GDPR requirements for data protection.
  • Payment Card Industry Data Security Standard (PCI-DSS): Our network security measures meet the standards set forth by PCI-DSS for handling sensitive financial data.
  • ISO/IEC 27001: We follow ISO/IEC 27001 principles for information security management, ensuring that our network security policies are continuously reviewed and improved.

6. Data Retention and Disposal

We retain network traffic logs and security data only for as long as necessary to meet operational needs and comply with legal requirements. When this data is no longer required, it is securely deleted to prevent unauthorized access.

7. Employee Training

All employees at Stockpilot.com receive regular training on network security best practices, including recognizing phishing attempts, securing endpoints, and adhering to internal access control policies.

8. Policy Review and Updates

This Network Security Policy is reviewed regularly to ensure that our network protection measures are up-to-date and aligned with emerging security threats. We continuously improve our security practices based on new industry standards, technological advancements, and regulatory requirements.

9. Contact Us

If you have any questions or concerns about our network security practices, please reach out to us:
Email: support@stockpilot.com
Phone: +31 (0)85 060 3151

Streamline your e-commerce operations today

Simplify your workflow with one platform to manage inventory, orders, and fulfillment — effortlessly.