Your Security Partner
At FACTS, we prioritise your school’s data security. Our comprehensive measures, including encryption and regular audits, ensure compliance with standards like ISO 27001, safeguarding your information.
Application Security and Encryption
Ensuring the security of our product involves strong application security and encryption practices. Data is safeguarded through encryption at rest and during transit, using industry-standard encryption algorithms. Routine security assessments identify and address potential vulnerabilities within the application, contributing to a secure environment for our users.
Cybersecurity
Cybersecurity is a foundational element of our defense strategy where we implement wide-ranging security measures, including firewalls, safeguards against distributed denial of service (DDoS) attacks, intrusion detection and prevention systems, secure network architecture and NGAV (Next-Generation Antivirus) for threat detection and response. Proactive threat intelligence is used to stay ahead of evolving cybersecurity risks, providing a resilient defense against malicious activities and other network-based threats, ensuring the integrity and availability of our services.
Testing and Threat Assessment
To maintain a proactive security posture, we undertake regular testing and threat assessments. This includes penetration testing, vulnerability scanning, and coding reviews. The results guide our ongoing efforts to enhance security controls and address emerging threats promptly, ensuring a robust and resilient threat defense.
Physical Security
Our data centres and infrastructure are located in secure facilities with restricted access. Surveillance, access controls, and environmental monitoring are in place to protect against unauthorized physical access and potential threats to the physical infrastructure.
Compliance
Business Continuity

Disaster Recovery
Our disaster recovery plan is designed to mitigate the impact of catastrophic events. This plan encompasses backup strategies, data recovery processes, and infrastructure redundancy. Regular testing and simulations of various scenarios are conducted to validate the effectiveness of our procedures. This proactive approach ensures that, in the event of a disaster, our systems can be restored efficiently, safeguarding data integrity with minimal impact on our users.

Infrastructure, Reliability, and Redundancy
Our hosting contains redundancy, including failover mechanisms and distributed architecture to enhance system reliability. This approach not only fortifies our infrastructure against potential failures but also provides a resilient platform to meet the performance expectations of our users.
Ready to Start the Conversation?
We’ll help you take care of the how, so you have more time to focus on your why.