Security & Backup Solutions
Protecting your data is our top priority.
In today’s digital age, local governments and utilities face an ever-growing threat. Cyberattacks on municipal and utility systems can disrupt essential services, compromise sensitive data, and undermine public trust. At Edmunds, we understand your unique challenges and offer robust software and hosting solutions tailored to protect your community’s critical assets.
Why Choose Edmunds?
With years of experience serving local governments, we are a trusted partner in protecting your data. Here’s why you should choose us:
- Proven Track Record: We have protected local governments and utilities for over 50 years.
- Custom Solutions: We understand that every municipality, county, and utility is different. Our solutions are customized to meet your specific needs and budget.
- Ongoing Partnership: We don’t just provide software; we become your long-term partner, ensuring systems are up-to-date and your data is secure.
Safety Measures Matters
As gatekeepers for vast amounts of personal, financial, and operational data, local governments are prime targets for cybercriminals. The consequences of a breach can be severe:
Data Breaches
Unauthorized access to citizen information, financial records, and confidential documents can lead to identity theft, economic loss, and legal repercussions.
Service Disruption
Attacks on municipal systems can halt essential services like public safety, water supply, and emergency response, putting lives at risk.
Public Trust
A breach can erode public confidence in local government, making it difficult to regain trust and maintain community support.
Security & Backup Solutions to
Fit Your Unique Needs:
Data encryption and secure hosting
- Protect sensitive information with end-to-end encryption, ensuring data is safe in transit and at rest.
- We do not store encryption keys in the database or on the host.
- Our secure hosting solutions are designed to comply with government regulations, offering peace of mind that your data is stored in a protected environment.
- Hosted servers use the Amazon Aurora database with data replicated across three availability zones.
- We install protection from viruses, malware, and ransomware on the host server.
Backup and disaster recovery
- Nightly server snapshots are created, and a database backup is sent to Amazon S3.
- Create a backup on demand.
- Host snapshots are retained for 30 days.
- We have a schedule for retaining Amazon S3 daily snapshots along with weekly, monthly, and yearly backups.
- Hosted servers are monitored by Amazon CloudWatch, which has built-in notifications for various server events.
Access control
- Ability to restrict connection to hosted servers from client-specific IP addresses.
- Role-based permissions allow the client to limit access and protect private data.
- Login and logout activity is recorded in an auditable format.
- After consecutive failed logins, clients are locked out for a short timeframe.
- Confidential data is restricted to Edmunds’s authorized personnel.
Audits, compliance, and insurance:
- We conduct frequent security audits to identify and address potential vulnerabilities, ensuring your systems are always one step ahead of cyber threats.
- SOC 2 Certified (Type II)
- Demo, development, and testing environments are separate from client servers.
- EGT Employees are required to complete security awareness training regularly.
- Our solutions are designed to meet the stringent requirements of government operations.
- We maintain cyber security insurance to help reduce financial impact due to business disruptions.
Support and incident response
- Our dedicated support team is available to assist with data security concerns.
- Automated updates give you the latest new features, system enhancements, and state/federal mandates, keeping you up-to-date and secure.
- In the event of a security incident, we offer rapid response services to minimize impact and restore normal operations as quickly as possible.