Secure Data Hosting

Secure Data Hosting by Cyforce

We protect our clients’ data by preserving it in our own data hosting environment, which operates on its own independent forensic server. Our high-performance infrastructure is powered by an intelligent security model, allowing 24/7 access and maintenance by a handful of NPPV security cleared senior forensic specialists.

Secure Data Hosting Service:

We are experienced in working in high-security environments where our systems need to be robust, secure, fully audited and access controlled. Our process for ensuring the security of sensitive data is backed up by our robust IT System, which enables us to store data, ‘locking down’ information that needs to be restricted password protected access. Cyforce’s secure data hosting network operates on its own independent forensic server. This network has no access to the internet ensuring that it cannot be compromised through remote access. All servers and forensic images are stored within our secure evidence store and are subject to the same physical protection as our exhibits.

Security Accreditations:

To further evidence our commitment to safeguarding data security CYFORCE holds the ISO/27001 Information Security Standard and our security arrangements have been independently inspected by The Metropolitan Police. Our ICT Systems have enhanced controls to manage risks, integrity and availability. Our systems ensure we deliver a timely, secure and efficient sharing of information. We have document control and control of records procedures within our integrated management system covering access to restricted information and the safe storage of records for the mandatory number of years. Cyforce maintains SC cleared across the business and holds NPPV Level 3 security clearances across all our forensic facilities.

Secure Evidence Storage:

Cyforce has extensive security arrangements in place to protect exhibits. Evidence stores are areas with the tightest security. All evidence is controlled via our Microsoft Dynamics Case Management system. Access to this is controlled so that only relevant security cleared staff can access these without supervision. All users have their own specific credentials which create an audit trail whenever they enter the store. Cyforce conducts a weekly random spot check to ensure the audit process is sufficient and being adhered to. Cyforce is conscious of the need to ensure that our practices and procedures will survive detailed scrutiny. Strict protocols are in place to ensure that all evidence is secure and its integrity preserved. A strict procedure is in force for the handling of the original evidence and all exhibits are immediately resealed once they have been handled. All internal forms contain checks to ensure that seals are secure and seal numbers are recorded as appropriate and a confirmation process is used which requires two members of staff to sign for the movement of evidence. All processes are documented and the complete case file is available for production where necessary.