8. SECURITY
8.1 Data is stored encrypted in enterprise databases, accessible only by authorized processes.
8.2 Zero-trust network architecture secures internal systems, requiring valid user-ids and passwords.
8.3 Access our marketplace with verified accounts and user credentials.
8.4 Ensure website authenticity when entering login details.
8.5 Security Precautions:
8.5.1 Protect account credentials;
8.5.2 Safeguard endpoints from viruses;
8.5.3 Prevent phishing and malware attacks;
8.5.4 Avoid email and social media scams;
8.5.5 Maintain cyber hygiene on devices;
8.5.6 Secure wallet private keys and avoid sharing.
Last updated