Security Program Highlights
FightAsthma.Info encrypts data at rest and in transit for all of our clients. We use tools to manage encryption keys using hardware security modules for maximum security in line with industry best practices.
FightAsthma.Info regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.
FightAsthma.Info only uses cloud hosting services with servers that are SHA-2 compliant, fully support SHA-256 connections and are protected from DDoS attacks (UDP flood) with extensive custom firewall rule, and significant mod security rule sets protecting our servers from various forms of attack.