Permeateq Security Practices

Effective Date: 2022

At Permeateq, we take the security of your systems and data seriously. As a leading provider of system support and maintenance in Kenya, our approach to security practices in Kenya is guided by international standards and local compliance requirements.


1. Overview

Permeateq implements a comprehensive set of security controls designed to protect your digital infrastructure, ensure system availability, and safeguard sensitive information. These security practices in Kenya apply to all services offered through our website and by our support teams.


2. Data Protection

We use advanced encryption protocols (TLS/SSL) to secure data transmission and AES-256 encryption for storage. All customer data is treated as confidential and is accessible only to authorized personnel under strict access control policies.


3. User Access Management

Access to client systems is granted on a role-based and need-to-know basis. Password policies enforce strong authentication, and we encourage multi-factor authentication (MFA) for all users interacting with our systems or dashboards.


4. Network Security

We deploy firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and continuous vulnerability scanning to detect and mitigate threats across our network infrastructure. All inbound and outbound traffic is monitored for anomalies.


5. Incident Response and Monitoring

We maintain a 24/7 incident response protocol. If a breach or threat is detected, our security team responds immediately with containment, root cause analysis, and remediation.


6. Physical Security

Permeateq’s operational environment includes restricted access to offices, biometric security where applicable, CCTV surveillance, and protected server rooms. Our local partners in Kenya are required to maintain equivalent security practices.


7. Backups and Disaster Recovery

We perform regular backups and system snapshots to ensure data continuity. Our disaster recovery plan is tested bi-annually to verify that we can recover critical systems quickly and reliably.


8. Vendor Security Assurance

All third-party vendors and partners undergo a thorough security vetting process. We require them to comply with our minimum security standards and sign data processing agreements where applicable.


9. Staff Training

Our team receives regular cybersecurity awareness and data protection training, covering the latest threat vectors, phishing risks, and secure handling of information.


10. Compliance

Permeateq complies with Kenya’s Data Protection Act, the Computer Misuse and Cybercrimes Act, and internationally recognized security frameworks such as ISO/IEC 27001.


11. Customer Responsibilities

Clients are responsible for maintaining the security of their credentials and promptly reporting any suspicious activity involving their systems or accounts.


12. Contact Us

If you have concerns about our security practices in Kenya, please reach out to:

Permeateq Digital
📧 Email: info@permeateq.com
📞 Phone: 0754235901

Image NewsLetter
Icon primary
Newsletter

Subscribe our newsletter

By clicking the button, you are agreeing with our Term & Conditions