128 and 256-bit Encryption as standard
myBookingWizard use an SSL encrypted connection during the booking phase with the customer. Encryption is the key to a safe Internet experience. Our SSL certificates support both industry-standard 128-bit and high-grade 256-bit SSL encryption to secure online transactions. The actual encryption strength on a secure connection using a digital certificate is determined by the level of encryption supported by the user’s browser and the server that the Web site resides on. For example, the combinationof a Firefox® browser and an Apache 2.X Web server enables up to 256-bit AES encryption.
Encryption strength is measured in key length—number of bits in the key. To decipher an SSL communication, one needs to generate the correct decoding key. Mathematically speaking, 2n possible values exist for an n-bit key. Thus, 40-bit encryption involves 240 possible values. 128- and 256-bit keys involve a staggering 2128 and 2256 possible combinations, respectively, rendering the encrypted data de facto impervious to intrusion. Even with a brute-force attack (the process of systematically trying all possible combinations until the right one is found) cracking a 128- or 256-bit encryption is computationally unfeasible.
High Security Data Centres
Data center access is limited to data center technicians and includes biometric scanning, security camera monitoring at all data center locations plus 24×7 onsite staff provide additional protection against unauthorized entry. Data centres are unmarked to help maintain low profile with physical security audited by an independent firm. All servers are physically hosted in the EU.
Server system are installed using hardened, patched OS with a dedicated firewall and VPN services to help block unauthorized system access. Important data is part of our managed backup solution.
All employees are trained on documented information security and privacy procedures so access to confidential information restricted to authorized personnel only, according to documented processes. All systems access is logged and tracked for auditing purposes and we operate a fully documented change-management procedure.
As you can see, we take data security very seriously here. If you want to know more about our security measures then drop us an email.