Information Security

Information Security is the practice of mitigating (and preferably eliminating) the possibility of unauthorised access to data. It goes alongside, and sometimes conflicts with, data protection which is the use of personal information and the privacy requirements thereof.

At Abstract Leap, we take both of these aspects very seriously. We embed secure coding practices in to our process, provide training to our staff and use third party consultants for external verification.

GDPR

GDPR

GDPR is a EU regulation on data protection and privacy in the EU that also addresses transfer of that data outside of the EU.

We have helped organisations understand their requirements under GDPR, document those requirements and then implement software and controls to enforce them.

Security First Development

Security First Development

Our engineers understand that developing secure software is a primary requirement for our clients and for us as a business. They all receive training on common sources of errors in the technologies that we use.

Our QA process specifically includes a final code review undertaken by a principal engineer, whose job it is to find security issues.

Pen Testing

Pen Testing

We make use of external security consultants who will "penetration test" our systems in order to verify, as an impartial party, the security of the software.

We recommend performing this testing on initial delivery of the software, during any large upgrades and then on a frequent ongoing basis.

ISO/IEC 27001

ISO/IEC 27001

ISO/IEC 27001 specifies a management system that is intended to bring information security under management control and gives specific requirements.

At Abstract Leap, we have experience of enabling our clients to achieve certification and have operated systems inside an ISO27001 audited environment.

Our approach

Business Led

Anyone can make software. The best engineers create great software by first understanding exactly what it needs to do and then building it in a maintainable manner.

Read more

Process

Agility in software development is based on the understanding that the priorities and requirements of a organisation change, often quite rapidly, and that software development should respond to those changes and, indeed, affect the changing priorities as well.

Read more

Technology

We predominantly use Microsoft technology for building our solutions. However, we also make use of other technology providers where it makes sense and look to use Open Source software where that provides a market leading option.

Read more

Information Security

Information Security is the practice of mitigating (and preferably eliminating) the possibility of unauthorised access to data. It goes alongside, and sometimes conflicts with, data protection which is the use of personal information and the privacy requirements thereof.

Read more

Want to find out more?

Ask us a question