Cyber
security
policy
Cyber Security Policy By Future Systems LLC.
About Future Systems
Recognized as a leading Web & App Development Company, Future Systems was established in 2017. Originally focused on website development, Future Systems has expanded its services to include web app development, software development, mobile game development, UI/UX design, and more. With a team of over 20 experienced professionals, Future Systems delivers innovative solutions using cutting-edge technologies like Artificial Intelligence, Machine Learning, Augmented Reality, and more.
With a Diverse Portfolio
With a portfolio of 1000+ successful projects, Future Systems serves clients across various industries such as crypto, healthcare, education, finance, and retail. Our expertise spans 50+ Apps, 500+ Websites, 20+ AI & IoT Solutions, 10+ Games, and 100+ other projects.
Our Global Presence
Headquartered in Armenia, Yerevan, Future Systems operates globally, with offices in Armenia, Israel, and Sweden. Our commitment to excellence has enabled us to earn a reputation as a trusted technology partner.
Network Security
In Office Premises
At Future Systems, we prioritize network security within our office premises. We utilize robust Sophos firewalls to regulate internet access, granting credentials exclusively to authorized employees. The firewall logs all activities, adhering to predefined rules. Access to Sophos-authorized internet is granted based on specific roles and seniority levels.
Cloud Network
For development projects, we utilize secure SSL-encrypted APIs and third-party integrations. Advanced security measures such as Web Application Firewalls (WAF) may be employed if necessary. Our cloud security protocols are customized according to client requirements.
Mobile Device Security
Company-provided mobile devices are solely for official use. These devices are password-protected, and only authorized employees have access. Mobile devices are submitted to authorized personnel at the end of each day, ensuring data security. Our centralized approach to device management facilitates secure and accessible data handling.
Use and Storage of Personally Identifiable Information & Notification
Personally identifiable information and notifications are stored on secure cloud networks. Only authorized personnel with access credentials can access this information. Our security officers maintain access records in a secure and non-shareable manner.
Notification System
Multiple login attempts trigger text messages or email notifications for enhanced security.
Employee Use of Social Networking Websites
Social networking access requests are evaluated based on specific criteria. Social networking access is granted for specific purposes, such as third-party platform integration. Our firewall records all internet-based activities.
Use of Wi-Fi Networks
All Wi-Fi networks are password protected, adhering to the WPA2 security standard. Wi-Fi access is limited to authorized personnel, with higher authorities having access to dedicated networks.
Data Backup Procedure
Regular auto-backups from our internal system to cloud servers occur monthly. Local system backups are not maintained, ensuring data security.