How can we help you today?

Continuous Defense: ShortPoint’s Program for Proactive Data Security

Security is woven into everything we do at ShortPoint. Literally everything! From the people we hire to the processes we follow and the technology we use, protecting our systems, safeguarding the limited data we collect (license and usage information), and ensuring the security of the ShortPoint platform are our top priorities. That's why we've built what we call Continuous Defense: a comprehensive program that keeps us constantly watching, testing, and improving our security settings around the clock.


Think of the Continuous Defense approach as having a dedicated security team that never sleeps. It's always on the lookout for potential security risks and vulnerabilities before they become real issues. This approach helps us effectively prevent unauthorized access to ShortPoint’s internal systems and maintain strong security standards across our platform


NOTEShortPoint does not access, store, or process customer content or data from your SharePoint environment. All references to “data,” “files,” or “information” in this article refer only to ShortPoint’s own internal corporate data and not customer SharePoint content.

Continuous Defense Approach


TABLE OF CONTENTS


Proactive Security: Continuous Detection of Weaknesses


Here in ShortPoint, we believe in the saying, "The best defense is to catch problems first; even before they actually become one." That's exactly why we're constantly checking our systems for vulnerabilities using advanced continuous monitoring and security features.


Round-the-Clock Vulnerability Scanning


We run continuous security scans, or what we call "Vulnerability Scans", across all our systems 24/7.  This proactive approach ensures infrastructure security and protects data effectively. It allows us to spot new vulnerabilities or configuration issues as soon as they appear. This means that we see potential threats not weeks or months later, but right where we can prevent them from causing real problems.


We also deploy advanced security agents and tools on our employees' computers and other dedicated software. These tools automatically review our code for vulnerabilities to protect ShortPoint’s internal systems and maintain a secure development process.


Regular Security Testing by Experts


Beyond automated scanning, we bring in real security experts to try to break into our systems (with permission, of course!). This penetration testing is done regularly (or even continuously) by either our certified in-house ShortPoint security professionals or independent third-party specialists who know all the tricks hackers might try.


We also build security features into our development process from day one. Every single code change goes through a mandatory security review by team members trained in secure coding practices. We use advanced protection techniques like code obfuscation to add extra layers of data encryption and security to our software. By tapping into all these, we enhance security and protect sensitive data.


Structured Remediation


NOTEAll references to “data,” “files,” or “information” in this section refer only to ShortPoint’s internal corporate systems and the limited personal data ShortPoint collects (license + usage information). ShortPoint does not store or process any customer SharePoint content.


We don't just identify security risks, we fix them fast. We believe that finding a security issue is only half the battle. What matters most is how quickly and effectively we address it. We consistently develop comprehensive Remediation plans that are strictly followed the moment an issue is identified.


Clear Timelines Based on Severity


When we discover a vulnerability, we immediately categorize it based on how serious it is and follow strict timelines for fixing it. We don't let critical issues sit around. They get immediate attention to maintain data security and protect sensitive files.

Here's how we prioritize:

  • Critical issues - these are the most serious threats. It includes vulnerabilities that could impact internal systems, administrative access, or the limited personal data ShortPoint collects (such as license and usage information).
  • High-severity issues - these are issues that could significantly compromise the security settings of our platform.
  • Moderate and Low issues - these are issues that hold little to no risk.

While vulnerability priority levels guide the urgency of our response, we ensure to address all issues as swiftly as possible.


Mandatory Monitoring of System Activity


If you've installed a security camera in your home before, you probably know that it records everything that happens around your home 24/7. No exceptions!


That's essentially what we do in ShortPoint. We have a Logging and Monitoring Policy that establishes comprehensive requirements for audit logging and monitoring of system activity across all ShortPoint system components.


What We Track


Our systems automatically create detailed records whenever important events occur, including key activities:


  • Any attempts to access, change, or delete ShortPoint internal system data
  • When people log in or out, and any failed login attempts
  • Every action taken by administrators (since they have the most access)
  • Changes to system settings, software updates, or security patches
  • Any suspicious activity detected by our security tools


Protecting the Records Themselves


These logs are kept accurate using time synchronization based on official atomic time standards, ensuring precise tracking of all events. The logs themselves are protected from tampering through robust security measures and stored securely in backup servers separate from our main systems.


Real-Time Monitoring


We don't just collect logs and call it a day. Our systems actively monitor everything in real time. It immediately alerts us if something critical fails or looks suspicious. This proactive approach to continuous monitoring and enforcing security policies helps us quickly identify and respond to potential security incidents.


Incident Management and Response Plan

Incident Management and Response Plan


Prevention is always the key. But even with the best prevention, things can still go wrong. Good thing, ShortPoint is prepared for it. We have created a formal Incident Response Plan (IRP) to ensure quick and effective action when a breach happens. It involves identifying, containing, investigating, resolving, and communicating information related to the breach. And to ensure its effectiveness, we test the plan every single year.


Quick Reporting and Response


The whole ShortPoint team is trained to safeguard security. Each team member knows that if they see potential security incidents or risks, they are to report them immediately, no exceptions. When we see that our customers might get affected, we update our status page to keep you informed with transparency and timely communication.


Once we confirm that a security incident has occurred, we spring into action following our established incident response plan to contain the problem and stop it from spreading. We're careful to preserve all evidence during this process to enable a thorough investigation and support regulatory compliance requirements.


Recovery and Learning


After we've contained a security incident, we work diligently to recover any affected ShortPoint internal systems or operational data.


But we don't stop there. Once everything is back to normal, we conduct a thorough post-mortem review. We ask ourselves: What was the root cause? How can we improve our security settings? What can we learn from this to prevent future security incidents? This review process is crucial for enhancing our security best practices and reinforcing our continuous monitoring efforts.


If needed, we provide additional training to our team on enforcing security policies. We also incorporate these lessons into our ongoing security risk reviews and compliance obligations. By constantly developing our response plan, our security protocols grow stronger and more resilient.


Maintaining Security with Continuous Defense


At ShortPoint, we don't take security as a one-time project. It is and will always be our ongoing commitment to you. Our Continuous Defense approach means we're always vigilant, always improving, and always putting data protection first. It's how we earn and keep your trust, day after day.


Related articles:

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.

World's best intranet sites are designed using ShortPoint

Get started today! Learn more
See all 12 topics

Start a trial

Ignite your vision. Install ShortPoint directly on your site, or play in sandbox mode. No credit card required.

Get started today

World’s best intranet sites are designed using ShortPoint

Thousands of companies using ShortPoint everyday to design, brand and build award winning intranet sites.

Get started Learn more