East White Oak has chosen Community Church Builder’s platform to securely host My Oak Central.
See excerpts below from CCB’s site for details on how they keep your data safe and private:
Your data is one of the most important aspects of the Church Community Builder Solution and we treat it as such. Having great security, resilience, and responsiveness in a solution is important, which is why we here at Church Community Builder have taken every effort to find the best way in which to host your data. The following details provide information about the capabilities provided by the Cloud Hosting Provider’s data centers where the Church Community Builder software is maintained and your live data is stored.
- Access to data centers is limited to only authorized individuals, and only for the time which they need facility access.
- Continuous monitoring for unauthorized facility access is performed via video surveillance, intrusion detection, and access log monitoring systems.
- Audits of over 2600 requirements are performed by external auditors throughout the year to validate compliance with numerous regulatory programs.
- Fully redundant power systems are built to ensure the availability of systems even in the event of a critical power failure.
- Water leakage detection systems are implemented to prevent system damage and outages.
- Climate control systems are in place to maintain acceptable temperatures for the servers, helping prevent system outages.
- Multiple data centers within the same region with high speed, highly available connectivity between them, allowing for data and system availability, even through a full data center outage.
- Highly available internet connectivity with scalable throughput.
Church Community Builder uses high-grade 256-bit certificates and modern TLS to encrypt access to our application, regardless of whether it’s user logins, accessing user data, or processing financial transaction data. These enterprise-level certificates maintained through Comodo Cybersecurity, provide assurance that your data is protected between our servers and your computer.
On the user end, we require that all individual logins require at least one numeric and one alpha character and that their password must be at least six characters long to further ensure the security of the data. After five unsuccessful attempts at login, a user’s account is automatically locked for a 60-minute period. Additionally, we also automatically log users out of sessions after six hours of inactivity to prevent unauthorized access.
Hardware & Software
Security and reliability depend on great systems. Church Community Builder’s solution has been designed from the ground up to implement industry best practices ranging from least privilege to network segmentation. As part of this, security patches for operating systems and installed applications are updated regularly, and systems are also hardened by disabling non-essential services/ports and enabling secure configurations on the operating systems and installed applications.
In addition to building secure systems, we also implement some pretty cool tools to protect against threats to our systems and your data. One of these is a web application firewall (WAF). This tool is built to inspect connections coming into our systems and analyze it for malicious behavior. Depending on the type of threat, the WAF may then present the user a captcha, or if it’s too risky, it’ll simply block the traffic.
Another type of threat that service providers face is a distributed denial of service (DDOS) attack. These types of attacks may be performed in many ways, but ultimately result in an impact to the availability of a service. To combat this, we have implemented a tool to provide us DDOS protection. You can be confident that even when something attempts to cause a DDOS to Church Community Builder’s services, access to your data will still be functional.
Church Community Builder does not own or have any rights to any data that the customer submits as a result of using the service. Church Community Builder will not monitor, edit, or disclose any information regarding the customer or customer’s database without the customer’s express written permission except as may be required by law.