Information security infrastructure
Our IT network and supporting technologies (network gateways, switches, routers, firewalls, servers) are managed and controlled by Computershare’s Technology Services group. The technical security controls incorporate security architecture principles (i.e. defence-in-depth, least privilege, default deny and fail secure) and security hardening guidelines (i.e. utilise secure encryption protocols and disable insecure protocols/versions).
Our defence-in-depth methodology uses various technologies and deployment locations to mitigate the effects of a DDoS or SYN/FLOOD attack. We use multiple Internet Service Providers to reduce the attack surface through various failover options, as well as load balancers and other traffic routing and monitoring equipment for further protection.
We have robust monitoring and alerting protocols in place at the network, application, and server level to provide visibility in real time of our system performance. Incident response plans, including specific procedures for
DDoS-type attacks are in place to enable detection, containment, eradication and recovery from any such attacks.