Data Security at Fluxion

Because we have customer safety at heart, we have set up a strict protocol that we respect for each of our projects.

Data Handling Process

SFTP (SSH File Transfer Protocol):

For secure SFTP file transfers, SSH keys or a username and password are required to connect to the server. Your FTP and file-sharing service must provide information on how to configure SSH keys for your account. The SSH protocol consists of a public key and a private key, which authenticates the server and the user.

Data Anonymization:

Anonymization of data has been defined as “a process whereby personal data is irreversibly altered in such a way that a data subject can no longer be identified directly or indirectly, either by the data controller alone or in collaboration with any other party”. Anonymization of data may allow the transfer of information across borders, for example between two departments of the same agency or between two agencies, while reducing the risk of unintended disclosure, and in some environments, this is done in a way that allows for post-anonymization evaluation and analysis.

Data Destruction:

At the end of a client’s project, data is destroyed according to NIST-800-88 standards. Data destruction is a software-based data overwrite method that completely destroys all electronic data residing on a hard disk or other digital media using zeros and ones to overwrite data on all sectors of the device. By overwriting the data on the storage device, the data is rendered unrecoverable and can be sanitized.

Tools and Software

At Fluxion, only the most secures software’s are used to insure the highest levels of privacy for the client’s data.

ProtonMail

This email messaging service is distinguished by automatic end-to-end encryption, without the user needing any knowledge of cryptographic techniques. The service is therefore just as simple to use, guaranteeing a very high level of confidentiality. The messages are stored on the ProtonMail servers in an encrypted format. They are also transmitted in encrypted form between our servers and users’ devices. Messages between ProtonMail users are also transmitted in encrypted form within our network of secure servers. Because data is encrypted at all stages, the risk of interception of messages is largely eliminated.

Wire

Combining secure messaging, voice and video calling, screen sharing and file sharing – Wire is designed for teams that need to protect their documents and secure communications internally, as well as with customers and partners. Wire uses industry-leading end-to-end encryption to secure messages, audio/video calls and shared documents. Each message is encrypted with a new key. Unlike competitors such as Microsoft Teams, Zoom or Slack, Wire does not hold the keys to decrypt your business communications. This architecture offers the best protection against malicious actors.

Sync

What makes this zero-knowledge cloud storage platform unique is that it guarantees privacy by encrypting and decrypting your data locally (on your device). The company (Sync) can’t access the data and therefore, your privacy is guaranteed. End-to-end encryption protects confidential data in the cloud from unauthorized access at all times. Two-factor authentication, granular user permissions, remote wipe, custom passwords, expiry dates, notifications and more ensure you’re always in control. Sync is safe to use, no matter where your business operates, with USA, EU / UK GDPR, and Canadian compliance built in.