We understand how important data security is in the mortgage industry, so we made sure our systems in place were what you could call a little "overboard" compared to some of the other processing companies. Our security systems are designed to protect the security and confidentiality of all the personal information we handle, protect against anticipated threats and also have plans for unanticipated threats, and to protect against unauthorized access or use of company wide systems or protected information.
Our processors handle a lot of personal information on their computers, so we have many systems in place to prevent unauthorized access and to secure all of the information and data on the computers. Our first line of security is how our processors sign in to their computers. They use the normal Microsoft sign in process and on top of that, they have to two factor authenticate themselves with their phone using the Duo RDP authenticator every time they sign in. Once they are signed into their computer, their phone is automatically connected via Bluetooth, so if the processor walks away from their computer without locking it, the computer will automatically lock itself. Also, the computers lock themselves automatically after five minutes of sitting idle. Every computer has extensive antivirus software as well as device encryption. We also use Microsoft BitLocker encryption that automatically locks down the computer completely if any hardware or software change is detected and requires a BitLocker key to unlock. All of the documents and data that we collect do not get stored on the computers themselves but rather on a cloud based filing system, so if a computer is damaged or stolen, the computer can be completely erased without losing any data.
Our work computers do not store information or data on the computers themselves. So, If at any point in time the computer is damaged, our processors would be able to pick up another company computer and continue working without losing any documents or data. If the unfortunate event occurs that a computer is stolen or lost, we are able to first track down the computer and see where it is. If we can not get the computer back or we feel that the computer is in the wrong hands, we can remotely erase all of the data on the computer at any time. Also, if the computer somehow did end up in the wrong hands, our security systems prevent anyone from being able to access any of the information on the computer before we erase it. Another way for people to access information on a locked computer that they can not get access to is to take the hard drive out of the computer and put it in another computer. We know this is a trick that computer thieves use and we took measures to prevent hard drive swapping from working. We are able to prevent this from happening by activating BitLocker keys on all of our computer's hard drives. We know that any leaked information is a disaster, so we made sure to go above and beyond the standards for computer security.
Emails are the best way for personal information to be leaked and for viruses and malware to be rooted into computers. We have advanced email encryption services that we use to prevent any data from being leaked out. We do this by encrypting the data in the email so that if any email is ever intercepted, it will be unreadable. We also have an email firewall on top of Microsoft's email filter that scans every email that comes to us. This firewall prevents potentially threatening emails from reaching our inboxes by scanning all attachments for potential viruses and malware. This firewall also reads URLs in the messages and makes sure that they do not go to any potentially harmful destinations. All of these features prevent data loss and security breaches company wide so that our clients never have to worry.
Copyright © 2023 Perceptive Mortgage Processing - All Rights Reserved.
Powered by GoDaddy Website Builder