At Buy Invest Live, we take your data security seriously. Here’s how our business and our brokers protect your sensitive information:
- Secure Document Collection: We use a secure portal for all document uploads, including bank statements, ensuring your data is protected during transmission.
- Cloud-Based Storage: No data is stored locally on computers. We use secure cloud-based systems with robust encryption to safeguard your information.
- Live Backup & Long-Term Storage: Your data is backed up in real-time and securely stored for 7 years, meeting legal requirements while ensuring data integrity.
- TFN Protection: We remove Tax File Numbers from documents to reduce the risk of identity theft.
- Mobile & Email Validation: We verify your contact details to prevent unauthorised access to your information.
- Compliance: Our practices align with federal cybersecurity guidelines to keep your data safe.
Remember, you play a crucial role in protecting your data too! Visit https://www.cyber.gov.au/learn-basics#toolkit to learn more about cybersecurity basics.
At Buy Invest Live, we’re committed to safeguarding your personal information throughout your home loan journey. Your trust is our priority!
#MortgageSecurity #DataProtection #CyberSmart #HomeLoanSafety
Here are some additional steps our business and mortgage brokers take to reduce cybersecurity risks:
- Multi-Factor Authentication (MFA): MFA required for all accounts accessing sensitive data, especially for remote access.
- Regular Staff Training: Conduct ongoing cybersecurity awareness training for all employees, focusing on recognising phishing attempts and social engineering tactics.
- Use Secure Document Portals: Implemented secure, encrypted portals for document collection and sharing with clients, rather than relying on email attachments.
- Conduct Regular Security Audits: Perform periodic assessments of your cybersecurity measures to identify and address vulnerabilities.
- Incident Response Plan: Regularly update a plan for responding to potential data breaches or cyber attacks.
- Limited Access to Sensitive Information: Principle of least privilege, ensuring employees only have access to the data necessary for their roles.
- Keep Software Updated: Regularly update all software, including operating systems, antivirus programs, and business applications to patch security vulnerabilities.
- Partner with Cybersecurity Experts: Work with specialised IT security firms to enhance our overall cybersecurity posture.
- Implemented Email Filtering: Use advanced email filtering systems to reduce the risk of phishing and malware attacks.
- Secure Mobile Devices: Implement mobile device management solutions to protect data on smartphones and tablets used for work purposes.
- Conduct Background Checks: Perform thorough background checks on new employees to reduce the risk of internal threats.
- Data Retention Policy: Developed and enforce a policy for securely disposing of data that is no longer needed.By law – some data is required to be held for 7 years.
- Monitor Third-Party Vendors: Regularly assess the security practices of any third-party vendors who we share data with .
By implementing these measures, Buy Invest Live mortgage brokers can significantly enhance their cybersecurity defences and better protect our clients’ sensitive information.
#buyinvestlive