{"id":3377,"date":"2020-09-10T10:16:29","date_gmt":"2020-09-10T10:16:29","guid":{"rendered":"http:\/\/www.goatrisk.com\/?page_id=3377"},"modified":"2024-10-01T10:05:15","modified_gmt":"2024-10-01T10:05:15","slug":"goats-information-security","status":"publish","type":"page","link":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/","title":{"rendered":"GOAT\u2019s Information Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"223\" class=\"alignnone size-full wp-image-3378\" style=\"max-width: 100%; height: auto;\" src=\"\/wp-content\/uploads\/2020\/09\/Information-Security.jpg\" alt=\"\" srcset=\"https:\/\/staging3.zealousys.com\/goatrisk\/wp-content\/uploads\/2020\/09\/Information-Security.jpg 791w, https:\/\/staging3.zealousys.com\/goatrisk\/wp-content\/uploads\/2020\/09\/Information-Security-300x85.jpg 300w, https:\/\/staging3.zealousys.com\/goatrisk\/wp-content\/uploads\/2020\/09\/Information-Security-768x217.jpg 768w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/p>\n<h2><strong>GOAT\u2019s Information Security\u00a0<\/strong><\/h2>\n<p><strong>Last updated 1st October 2024<\/strong><\/p>\n<p>We know information security is critical and we take this very seriously.\u00a0 Our systems are compliant with ISO 27001 controls which is globally recognised as the leading standard for information security management.\u00a0 GOAT Risk\u2122 is also compliant with Payment Card Industry Data Security Standards (PCI DSS), and Azure Centre for Internet Security (CIS) 1.1.0 controls.<\/p>\n<p><strong>Protecting your data<\/strong><\/p>\n<p>GOAT is hosted on Microsoft Azure\u2019s cloud platform and benefits from knowledge, resources and a suite of scanning and security tools.\u00a0 GOAT has implemented the added protection of the Azure Front Door service which includes a suite of features including its Web Application Firewall (WAF) and protection against Distributed Denial of Service (DDoS).\u00a0 The data is stored in Microsoft\u2019s UK data centres (UK South and UK West locations).\u00a0 Billing details reside with and protected by 3<sup>rd<\/sup> party payment processing company Stripe.<\/p>\n<p><strong>Behind the systems<\/strong><\/p>\n<p>GOAT is a small company which means only a core team of trusted senior employees have access to the system and data.\u00a0 Whilst we benefit from an offshore 3<sup>rd<\/sup> party development partner with scalable resources, we keep them in a separate environment and they do not have access to the live system or client data.\u00a0 We conduct 3rd party pentration tests after major releases or annually as well as conducting our own Information Security Risk Assessment.<\/p>\n<p><strong>Technical details<\/strong><\/p>\n<ul>\n<li>Daily security scans including patch management and activity alerts<\/li>\n<li>Source code analysis tool used before deployment to User Acceptance Testing (UAT) and Production environments<\/li>\n<li>Data transferred between users and GOAT are encrypted by Secure Sockets Layer (SSL) in transit and at rest<\/li>\n<li>Separation of development, testing and dual instance production environments<\/li>\n<li>Client data backed up for 30 days<\/li>\n<li>Client data is not replicated in testing and UAT<\/li>\n<li>Single or two factor authentication available with minimum password controls<\/li>\n<li>User passwords are encrypted<\/li>\n<li>Access controls and users managed by your Administrator, though risks and risk profiles can be locked by owners.<\/li>\n<li>Access controls by client down to risk level<\/li>\n<\/ul>\n<p><strong>Data Privacy Policy<\/strong><\/p>\n<p><a href=\"https:\/\/staging3.zealousys.com\/goatrisk\/privacy-policy\/\">https:\/\/staging3.zealousys.com\/goatrisk\/privacy-policy\/<\/a><\/p>\n<p><strong><br \/>\nSuspicious activity<\/strong><\/p>\n<p>If you detect any suspicious activity or have any questions, please contact <a href=\"mailto:support@staging3.zealousys.com\">support@staging3.zealousys.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GOAT\u2019s Information Security\u00a0 Last updated 1st October 2024 We know information security is critical and we take this very seriously.\u00a0 Our systems are compliant with ISO 27001 controls which is&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-3377","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.8 (Yoast SEO v16.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GOAT\u2019s Information Security | GOAT Risk Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GOAT\u2019s Information Security\" \/>\n<meta property=\"og:description\" content=\"GOAT\u2019s Information Security\u00a0 Last updated 1st October 2024 We know information security is critical and we take this very seriously.\u00a0 Our systems are compliant with ISO 27001 controls which is...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"GOAT Risk Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-01T10:05:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging3.zealousys.com\/wp-content\/uploads\/2020\/09\/Information-Security.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#organization\",\"name\":\"GOAT Risk Solutions\",\"url\":\"https:\/\/staging3.zealousys.com\/goatrisk\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/18949403\",\"https:\/\/www.youtube.com\/channel\/UCLAlQ30CBAuRRexoAdsyvDg\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#logo\",\"inLanguage\":\"en-GB\",\"url\":\"\/wp-content\/uploads\/2021\/07\/Goat-Logo_White-on-Red-Elongated_CMYK.png\",\"contentUrl\":\"\/wp-content\/uploads\/2021\/07\/Goat-Logo_White-on-Red-Elongated_CMYK.png\",\"width\":3601,\"height\":4287,\"caption\":\"GOAT Risk Solutions\"},\"image\":{\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#website\",\"url\":\"https:\/\/staging3.zealousys.com\/goatrisk\/\",\"name\":\"GOAT Risk Solutions\",\"description\":\"Easy to use, low cost risk management software\",\"publisher\":{\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging3.zealousys.com\/goatrisk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#primaryimage\",\"inLanguage\":\"en-GB\",\"url\":\"\/wp-content\/uploads\/2020\/09\/Information-Security.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2020\/09\/Information-Security.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#webpage\",\"url\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/\",\"name\":\"GOAT\\u2019s Information Security | GOAT Risk Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#primaryimage\"},\"datePublished\":\"2020-09-10T10:16:29+00:00\",\"dateModified\":\"2024-10-01T10:05:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging3.zealousys.com\/goatrisk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GOAT\\u2019s Information Security\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"GOAT\u2019s Information Security | GOAT Risk Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/","og_locale":"en_GB","og_type":"article","og_title":"GOAT\u2019s Information Security","og_description":"GOAT\u2019s Information Security\u00a0 Last updated 1st October 2024 We know information security is critical and we take this very seriously.\u00a0 Our systems are compliant with ISO 27001 controls which is...","og_url":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/","og_site_name":"GOAT Risk Solutions","article_modified_time":"2024-10-01T10:05:15+00:00","og_image":[{"url":"https:\/\/staging3.zealousys.com\/wp-content\/uploads\/2020\/09\/Information-Security.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#organization","name":"GOAT Risk Solutions","url":"https:\/\/staging3.zealousys.com\/goatrisk\/","sameAs":["https:\/\/www.linkedin.com\/company\/18949403","https:\/\/www.youtube.com\/channel\/UCLAlQ30CBAuRRexoAdsyvDg"],"logo":{"@type":"ImageObject","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#logo","inLanguage":"en-GB","url":"\/wp-content\/uploads\/2021\/07\/Goat-Logo_White-on-Red-Elongated_CMYK.png","contentUrl":"\/wp-content\/uploads\/2021\/07\/Goat-Logo_White-on-Red-Elongated_CMYK.png","width":3601,"height":4287,"caption":"GOAT Risk Solutions"},"image":{"@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#logo"}},{"@type":"WebSite","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#website","url":"https:\/\/staging3.zealousys.com\/goatrisk\/","name":"GOAT Risk Solutions","description":"Easy to use, low cost risk management software","publisher":{"@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging3.zealousys.com\/goatrisk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"ImageObject","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#primaryimage","inLanguage":"en-GB","url":"\/wp-content\/uploads\/2020\/09\/Information-Security.jpg","contentUrl":"\/wp-content\/uploads\/2020\/09\/Information-Security.jpg"},{"@type":"WebPage","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#webpage","url":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/","name":"GOAT\u2019s Information Security | GOAT Risk Solutions","isPartOf":{"@id":"https:\/\/staging3.zealousys.com\/goatrisk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#primaryimage"},"datePublished":"2020-09-10T10:16:29+00:00","dateModified":"2024-10-01T10:05:15+00:00","breadcrumb":{"@id":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging3.zealousys.com\/goatrisk\/goats-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging3.zealousys.com\/goatrisk\/"},{"@type":"ListItem","position":2,"name":"GOAT\u2019s Information Security"}]}]}},"_links":{"self":[{"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/pages\/3377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/comments?post=3377"}],"version-history":[{"count":18,"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/pages\/3377\/revisions"}],"predecessor-version":[{"id":6282,"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/pages\/3377\/revisions\/6282"}],"wp:attachment":[{"href":"https:\/\/staging3.zealousys.com\/goatrisk\/wp-json\/wp\/v2\/media?parent=3377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}