Our Commitment to Your Safety
At Keystone Edge Company, we recognize that the trust you place in us is built on how we handle your personal and financial information. Our Security Policy outlines the systems and practices we’ve put in place to ensure that your data and assets are secure—at all times.
1. Data Encryption & Network Protection
All communications between your device and our servers are encrypted using 256-bit SSL encryption, the same technology trusted by major financial institutions worldwide. Our servers are protected behind advanced firewalls, and all network activities are continuously monitored for suspicious behavior.
2. Authentication Protocols
To prevent unauthorized access:
-
We enforce multi-factor authentication (MFA) for all logins.
-
Users are notified of any new login attempts.
-
Session tokens are regularly refreshed and secured against hijacking.
3. Infrastructure and Data Centers
Our infrastructure is hosted in Tier IV certified data centers, offering redundant power, backup systems, and 24/7 security surveillance. We follow a strict access control policy for both physical and digital systems.
4. Monitoring and Intrusion Detection
Lendex runs real-time security scans and behavioral analytics to detect anomalies, brute-force attempts, or any potential cyber threats. We partner with industry leaders to ensure that our defenses remain ahead of evolving threats.
5. Incident Response & Reporting
In the rare event of a security breach, our Incident Response Team (IRT) follows a clearly defined response protocol, including immediate containment, analysis, notification (if required), and full remediation.
If you notice suspicious activity or believe your account has been compromised, please contact our Security Desk immediately at support@keystoneedgecompany.com.