At myhrtoolkit we understand just how important security and information safe-guarding is to our customers and website visitors. With that in mind, we employ modern security best practice to ensure that your data is safe. Additionally, myhrtoolkit are registered with the Office of the Information Commissioner as a data processor. The following sections outline our security and support systems.
You may also like to visit our Privacy and GDPR area.
This web tool monitors and displays the current status of each of our services; the Main Toolkit App, the Mobile App, the API and the www.myhrtoolkit.com web site. It also provides detail of any future maintenance. View it here: https://status.myhrtoolkit.com/
State-of-the-art secure hosting
The best security needs to extend all the way to the hardware level. Myhrtoolkit utilises Google Cloud Platform (GCP) to provide a secure and robust infrastructure.
Our infrastructure is protected by an advanced firewall. All services and ports other than standard web ports, are either removed or locked down by IP address. They run a patched and hardened installation of Linux.
Our infrastructure is highly resilient, with the ability auto-heal and scale on demand. All of our servers are kept up to date with the very latest security measures and patches.
GCP are fully ISO 27001 compliant.
If after reading this document, you require further information regarding Google Cloud Platform and the services they provide to us, please visit https://cloud.google.com/why-google-cloud/. You can also learn more about their security and see all of GCP’s accreditations at https://cloud.google.com/security/compliance/
Myhrtoolkit utilises the best encryption available. Our certificates are encrypted with 256bit encryption and all data that passes between you and our servers is encrypted with industry standard 128bit encryption. All passwords are encrypted using standard AES encryption algorithms. General data is obfuscated but not encrypted as this needs to be searchable and indexed. Encrypting all field level data would impact performance too much and isn’t feasible. This is a standard approach. We regularly update our encryption methods to ensure that we drop support for weak ciphers and apply security patches as soon as they are available. Connections to and from our servers takes place over SSL. We have strengthened our SSL (or accurately TLS) connections significantly and only support strong cipher suites. Weaker SSL v2 and v3 protocols are not supported and TLS 1.0 will be dropped in due course. We recommend a minimum of TLS 1.2.
We are not required to be PCI DSS audited but where possible we use this standard as best practice. We have achieved an A grade from Qualys SSL Labs, which can be seen at https://www.ssllabs.com/ssltest/analyze.html?d=app.myhrtoolkit.com
- What is the reason why you are not PCI DSS Audited?
We do not require PCI audit as we do not process or hold payment card data. Such card processing as we undertake is managed for us by a third party merchant, Worldpay; an international card payment company that processes around 31 million payments per day. They are fully PCI compliant.
However, we do look to the PCI standards to guide our internal development and processes.
- All data that passes between your and our servers is encrypted with industry standard 128bit encryption. Why is this not 256 bit encryption?
There are 2 components to communication encryption; key strength and data in transit.
Our key strength meets the RSA2048 bit standard, and is thus incredibly secure.
The encryption level used for data in transit is browser dependent. That is, it relies on the level of encryption supported by the browser of the user. As such and in line with PCI standards, we currently support connections of between 128 and 256 bit. The lower level will be deprecated in line with current PCI guidelines. At the same time, we will drop support for TLS 1.0 & 1.1 ciphers and mandate TLS 1.2 (SSL having been dropped in 2013).
As a consequence, support for IE version 8, 9, 10 and prior will also be dropped. Microsoft dropped support for all but IE11 and Edge back in January 2016.
2018 will see a major change to internet security. One of the most longstanding security protocols, Transport Layer Security version 1 (TLS 1.0 and in some cases TLS 1.1), is having support removed later in 2018.
For the majority of people, who are accessing the web via a modern browser, this will not represent an issue. However anyone still using an older browser will find they are unable to access many sites, including myhrtoolkit.
To assist in identifying if you will be affected, we will display a message on the login screen where we detect that you are connecting via an older browser that will be potentially effected after June.
The solution is to either upgrade your existing browser, or switch to a more modern version.
To help understand the issue further and offer some guidance, our Technical Director has written this useful article explaining things in more detail.
Each week our server application is scanned by Netcraft for vulnerabilities. Any found are resolved within days. From the Netcraft website : “Netcraft updates its test suite daily, adding new tests for the latest security exploits. A site with an up to date “Audited by Netcraft” seal is your assurance that the site owner is vigilant and maintaining the security of their site against the latest Internet security vulnerabilities.”
You can see our current Audited by Netcraft status and more information at
Distributed Denial of Service (DDoS) attack
A DDoS attack is an attempt to maliciously disrupt an online service by overwhelming the service with unusually high traffic until the service is no longer able to process genuine requests. Often this may be accompanied by a request for payment to stop the attack. Sadly, this is becoming an increasingly common part of the life of an online business, with companies such as Twitter and Instagram having been affected.
To maintain a solid defence against DDoS type attacks, our technical partners GCP and CloudFlare utilise sophisticated proprietary systems to both prevent and mitigate an attack of this nature.
Brute Force attack
Our login system has inbuilt protection against attempts to break into the system using automated brute force attack.
Disaster Recovery Data back-up
We understand the importance of regular reliable backups to ensure system availability and continuity; as such, we operate a comprehensive backup routine for the purposes of disaster recovery.
Our database is backed up hourly. This backup is encrypted, transmitted to multiple off-site locations, over a secure connection and remains encrypted whilst it is outside our network. It is stored with multiple PCI DSS Level 1 service providers on resilient and fault-tolerant media. All backups are stored for 30 days before being securely deleted.
Your files are encrypted and stored redundantly across multiple zones. Google Cloud Storage offers 99.999999999% durability and 99.9% availability.
All facilities are based entirely in the EEA.
Please note that individual data, records or documents cannot be extracted from this back up.
Upon closure of an account, we archive customer data for a further 30 days before deleting all data rendering it non-recoverable. Prior to this archive, we can assist in data extraction. Following the archive period, account data then resides in the disaster recovery back up for a further 30 days, as mentioned above.
How is customer data classified, handled and stored?
All customer data is treated as confidential when it is received or viewed. Access to this information is restricted to a limited number of personnel on a “need to know” basis, and who are subject to an internal confidentiality agreement.
Our default position is that no-one accesses any identifiable customer data for any reason. However, to allow us to properly diagnose problems and fix bugs, we may occasionally require access to customer data, following a well-defined and permission-focussed process. See our Customer Data Access Policy for more details.
All database access is logged and checked regularly by our IT Director. Once issues are resolved, all copies of data are securely destroyed from our development environment and servers, and any paper records shredded. From initial customer data access requests through to the final destruction of retreived data, the whole process is audited and checked regularly by the IT Director.
Hard copy information is disposed of via a fully accredited third party data destruction company.
A full statement about this can be found in our Customer Data Access Policy.
Every Toolkit system features a hub called the Security Centre; providing system Controllers with oversight of and tools to manage their own security.
This includes a Password Builder which allows the Controller to specify the components that make up their passwords, such as minimum length and character type.
More information about the Security Centre can be found here.
Service & Support
Myhrtoolkit comprises a team of professionals who are dedicated to making myhrtoolkit both highly secure and extremely reliable. We are committed to ensuring that when a problem does arise we are responsive and quick to resolve it. At the hardware level, our GCP infrastructure has been setup to be as fault-tolerant as possible with auto-healing and auto-scaling features.
When you do need support, you can find a fully integrated help section within myhrtoolkit. Here you can find a guide to using myhrtoolkit as well a form to send a direct message to the myhrtoolkit Support team. Additionally there are a wide range of support documents and videos on the support areas of our website at https://www.myhrtoolkit.com/support/.
Alternatively, support is available by email from a member of the team within myhrtoolkit business hours: 09:00 – 17:00 Monday to Friday (UK Time).
Myhrtoolkit is compliant with the General Data Protection Regulation (GDPR) (EU) 2016/679.
We have a Resource Centre for Privacy and GDPR here.
last updated on : 26th November 2018 @ 13:17