Cybersecurity is a top priority for any SaaS platform, and at Gold-Vision, we take it seriously.
In this on-demand webinar, our infrastructure team shares how we keep Gold-Vision secure, from physical servers and network firewalls to compliance protocols and disaster recovery. Watch the session below to learn how we protect your data and what makes our UK-based hosting model different.
How We Keep Gold-Vision Secure – Webinar Transcript
Part 1: Introductions & Purpose
Molly: Welcome! In this on-demand webinar, we’re talking about how we keep Gold-Vision secure—our best practices, internal processes, and practical tips for your team.
Molly: I’m Molly from the Customer Success team. Joining me are Adrian and Iwan from our infrastructure and IT teams.
Adrian: I’m Head of IT and Security, here for nine years.
Iwan: I’m Infrastructure Engineer, handling infrastructure and system security.
Part 2: Key Areas of Infrastructure Security
Adrian: We host Gold-Vision in UK data centres with multiple layers of security: CCTV, fob access, alarms, and strict permissions.
We secure the OS, firewall, and software with regular updates, anti-malware, and internal/external audits. Backups are encrypted and replicated to an alternate UK data centre for disaster recovery.
Part 3: Disaster Recovery & Monitoring
Iwan: We perform daily backups with 28-day retention and real-time replication. Tools like PRTG monitor uptime, memory usage, and anomalies.
Scripts check key service status across hosted systems, helping us react before problems escalate.
Part 4: Staff Training & Zero Trust
Adrian: Staff are trained on policies. We operate a zero trust model—access is limited and logged. Two-factor authentication is required for system access.
Part 5: Tips for Your Organisation
Iwan: Use MFA/2FA, antivirus, data encryption, access logging, and password managers. Keep systems patched.
Adrian: Subscribe to updates from NCSC (UK) or CISA (US). Skim security emails—don’t ignore them. They may contain critical alerts.
Part 6: Live Q&A Highlights
Sharon: Can we get an RTO paragraph?
Answer: Yes, we’ll send that post-webinar.
Dave: Do you monitor on-prem plugins?
Answer: No, just hosted systems. We use PRTG to monitor services and performance on our end.
Sean: Is dark web monitoring for customers or internal use?
Answer: Internal only. We scan for leaked credentials tied to our email domains.
John: Can admins view 2FA status?
Answer: Not currently. We’ll raise it with our product team. In the meantime, support can provide that data on request.
Part 7: Final Thoughts & Takeaways
- Accreditations enforce good habits and demonstrate accountability
- MFA/2FA adds major protection with minimal effort
- Security tools and outsourced services are worth the investment
- Staff training and the zero trust mindset are vital
- Every business is at risk—planning and preparation make the difference
Part 8: Closing Remarks
Molly: Thanks for joining us! If you requested a recovery paragraph, we’ll send it shortly. For follow-ups, contact support@gold-vision.com.
We’ll be announcing our next webinar soon. Stay safe and secure—see you next time!
Your hosts…
Before you go, here are some other quick reads we think you’ll enjoy: