Cybersecurity is a top priority for any SaaS platform, and at Gold-Vision, we take it seriously.

In this on-demand webinar, our infrastructure team shares how we keep Gold-Vision secure, from physical servers and network firewalls to compliance protocols and disaster recovery. Watch the session below to learn how we protect your data and what makes our UK-based hosting model different.

How We Keep Gold-Vision Secure – Webinar Transcript
Part 1: Introductions & Purpose

Molly: Welcome! In this on-demand webinar, we’re talking about how we keep Gold-Vision secure—our best practices, internal processes, and practical tips for your team.

Molly: I’m Molly from the Customer Success team. Joining me are Adrian and Iwan from our infrastructure and IT teams.

Adrian: I’m Head of IT and Security, here for nine years.

Iwan: I’m Infrastructure Engineer, handling infrastructure and system security.

Part 2: Key Areas of Infrastructure Security

Adrian: We host Gold-Vision in UK data centres with multiple layers of security: CCTV, fob access, alarms, and strict permissions.

We secure the OS, firewall, and software with regular updates, anti-malware, and internal/external audits. Backups are encrypted and replicated to an alternate UK data centre for disaster recovery.

Part 3: Disaster Recovery & Monitoring

Iwan: We perform daily backups with 28-day retention and real-time replication. Tools like PRTG monitor uptime, memory usage, and anomalies.

Scripts check key service status across hosted systems, helping us react before problems escalate.

Part 4: Staff Training & Zero Trust

Adrian: Staff are trained on policies. We operate a zero trust model—access is limited and logged. Two-factor authentication is required for system access.

Part 5: Tips for Your Organisation

Iwan: Use MFA/2FA, antivirus, data encryption, access logging, and password managers. Keep systems patched.

Adrian: Subscribe to updates from NCSC (UK) or CISA (US). Skim security emails—don’t ignore them. They may contain critical alerts.

Part 6: Live Q&A Highlights

Sharon: Can we get an RTO paragraph?
Answer: Yes, we’ll send that post-webinar.

Dave: Do you monitor on-prem plugins?
Answer: No, just hosted systems. We use PRTG to monitor services and performance on our end.

Sean: Is dark web monitoring for customers or internal use?
Answer: Internal only. We scan for leaked credentials tied to our email domains.

John: Can admins view 2FA status?
Answer: Not currently. We’ll raise it with our product team. In the meantime, support can provide that data on request.

Part 7: Final Thoughts & Takeaways
  • Accreditations enforce good habits and demonstrate accountability
  • MFA/2FA adds major protection with minimal effort
  • Security tools and outsourced services are worth the investment
  • Staff training and the zero trust mindset are vital
  • Every business is at risk—planning and preparation make the difference
Part 8: Closing Remarks

Molly: Thanks for joining us! If you requested a recovery paragraph, we’ll send it shortly. For follow-ups, contact support@gold-vision.com.

We’ll be announcing our next webinar soon. Stay safe and secure—see you next time!

Your hosts…

Gold-Vision CRM team member with glasses and beard wearing an 'Energize' shirt, smiling in front of an office background, LinkedIn icon included.

Adrian Coles

Head of IT & Security

Gold-Vision CRM team member with long curly hair and beard wearing a light blue shirt, smiling in front of an office background, LinkedIn icon included.

Euan Steedman

Infrastructure Engineer

This webinar was recorded on Wednesday 4th June 2025

We're committed to your privacy. For more information please read our Privacy Notice.