Security

Last Updated: October 30, 2025
Version: 1.0

Our Security Commitment

Your security and privacy are our top priorities. This page outlines our security measures, best practices, and how we protect your data and communications.

Infrastructure Security

Hosting and Data Centers

  • Enterprise Hosting: Hosted on secure, enterprise-grade servers
  • Geographic Distribution: Data replicated across multiple data centers
  • DDoS Protection: Enterprise-level DDoS mitigation
  • 24/7 Monitoring: Continuous security monitoring

Encryption Standards

  • In Transit: TLS 1.3 encryption for all data transmission
  • At Rest: AES-256 encryption for stored data
  • Secure Channels: HTTPS only, no unencrypted HTTP

Data Protection

Contact Form Security

  • All form submissions are encrypted in transit
  • Input validation and sanitization on all fields
  • Spam and abuse detection
  • Rate limiting to prevent abuse (5 requests per hour per IP)

Email Security

  • All email transmissions encrypted
  • Email verification for contact confirmations
  • Secure provider (Resend) with industry certifications

Database Security

  • Row Level Security (RLS) for data isolation
  • Regular backups with encryption
  • Access logs and audit trails

Vulnerability Management

Security Testing

  • Regular vulnerability scans
  • Automated dependency vulnerability detection
  • Code security reviews

Dependency Management

  • Automated security updates for dependencies
  • Regular audits of third-party packages
  • Version control and tracking

Incident Response

Incident Response Plan

  • Continuous monitoring for suspicious activity
  • Rapid incident response procedures
  • Regular security drills and testing

Breach Notification

  • Users notified within 72 hours of any breach
  • Full transparency about scope and impact
  • Remediation plan shared immediately

Compliance

Regulatory Compliance

  • GDPR: Compliant with EU data protection
  • CCPA: Compliant with California privacy law
  • ISO 27001: Information security certified

Best Practices for Users

Protecting Your Account

  • Use a strong, unique password
  • Enable two-factor authentication when available
  • Do not share your credentials
  • Log out of shared devices

Safe Communication

  • Use HTTPS connections (look for the lock icon)
  • Verify email addresses before trusting links
  • Never share sensitive information via email
  • Use strong passwords for your email account

Device Security

  • Keep your operating system updated
  • Use antivirus software
  • Avoid public WiFi for sensitive transactions
  • Use a VPN on public networks

Responsible Disclosure

Report a Vulnerability

If you discover a security vulnerability, please email security@namoslabs.com with:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Your contact information

Our Commitment

  • Acknowledge receipt within 48 hours
  • Provide remediation timeline
  • Keep you updated on progress
  • Credit you (if desired) for disclosure

Contact

Security Issues: security@namoslabs.com

General Questions: naya@namoslabs.com

Vulnerability Reports: security@namoslabs.com

Response Time: Within 24 hours for security issues

Security is an ongoing commitment. We continuously monitor, update, and improve our security posture. Thank you for trusting us with your information.