We implement encryption, access controls, and secure transfer protocols to protect your data. We also use geo-redundant and zone-redundant backups for added security.