Q. How are attacks monitored and documented?
A. We have network intrusion detection, brute force detection and failed authentication attempt logging in place. These are logged for varying periods of time.
Q. How quickly can the cloud service provider respond?
A. We have automated network-edge blocking in place for DOS, Brute force, network scanning and other forms of attack attempts
Q. What recovery methods are used?
A. In the event of a security issue, we have a number of mechanisms for recovery, depending on the event in question. A broad range of methods from account password resets, to backup snapshot rollback recovery is available.