We are here to help

Security Policy

We take security very seriously and have developed a comprehensive set of practices, technologies, and policies to help ensure your data is secure.

Security is essential in working with customers’ information, Help Desk Migration Service team builds the service on the effective and security-focused practices.

This document outlines some of the mechanisms and processes that we have implemented to help ensure that your business information is protected. Help Desk Migration security is grouped into 4 different areas:

  • Physical Security;
  • Network Security;
  • People Processes;
  • Redundancy and Business Continuity.

Physical Security Layer

Our data centers are hosted on Hetzner secure facilities. It includes:

  • High-security video-monitored around all perimeter;
  • Entry via a transponder key in electronic access control terminals;
  • Surveillance cameras for 24/7 monitoring of access routes.

Furthermore, it is protected from physical and logical attacks, and from natural disasters such as fires or floods.

Network Security Layer

Help Desk Migration network security team protects your data against the most sophisticated electronic attacks. We use the best and proven practices of network security. Help Desk Migration offers the following preventive measures:

  • network firewalls;
  • DDoS preventions (We use the latest hardware appliances and sophisticated perimeter security technologies, providing you with first-rate protection against large-scale DDoS attacks.);
  • network posture assessment.

HIPAA Compliance

Help Desk Migration is not in compliance with HIPAA.

Why does Help Desk Migration need specific permissions to perform the import?

Help Desk MIgration asks for these permissions to connect with your current and new help desk systems. After establishing the connection, we can access and transition the data. Without these permissions the help desk migration is impossible.

Application Security Layer

Our service provides you with HTTPS-encrypted communication, role-based authorization, and validation of all requests to ensure the security on the application level.

Security Audits

On a regular basis, we scan all systems to prevent any vulnerabilities. The software is constantly updated, so all connections to the previous version are limited, logged and checked.We absolutely comply with your confidentiality and guarantee that all your help desk data is 100% secure before, during, and after migration procedure. We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.

What does Help Desk Migration do with the information it collects?

The credentials you input are used during the migration only and are not placed in long-term storage. Nor is it shared with third parties or used for other purposes.

Ensuring security of your information

Overall, asking why a software service like Help Desk Migration needs specific permission is great practice. Other questions you could ask yourself in similar situations are:

  • Is this app/service a trustworthy source?
  • Do I understand why this app needs these permissions?
  • Does the app developer explain why they need these permissions?

Contact Us

All the questions, comments, requests and complaints regarding your data security and the information we hold are welcome and should be addressed to Help Desk Migration at contact@help-desk-migration.com

Book a Call
— %s