We know this isn’t just another website — this is your livelihood.
That’s why security is at the heart of everything we do.
Our base infrastructure runs on some of the most secure infrastructure available (Google Cloud Platform).
We ensure that all our partners and infrastructure providers meet our high security standards.
We use industry-standard encryption to secure your data, from your browser all the way down to our servers.
Security best practices are built into software designs, and coding processes.
We extensively test our software to prevent any problems.
Our software is routinely audited by external technology security providers to ensure we don’t miss anything.
We have a dedicated internal security team that’s actively monitoring our systems and is ready to respond in the event of suspicious activity.
We are certified HIPPA, SOC, and PCI compliant, which helps set a high standard.
Our processes are designed to keep us accountable to you, and earn your trust.
We’re happy to share the details.
Feel free to ask us for more, anytime.
All Wingspan services and data are protected with bank-level encryption in transit (using TLS 1.2 and above) and at rest (provided by GCP).
In the unlikely event of a security breach, Wingspan's internal security team will secure our member's data and notify those affected as soon as the breach is contained.
We continuously monitor our infrastructure for performance, reliability and suspicious activity. Periodically, we engage with external technology security companies to audit and test our security policies.
Wingspan is fully compliant with HIPPA, SOC and PCI.
Wingspan is there when you need us: we strive to make our service available 24/7/365.
All data is replicated and backed up continuously just in case.
All Wingspan services and data are protected with bank-level encryption in transit (using TLS 1.2 and abAll Wingspan employees are trained and certified on data handling best practices.ove) and at rest (provided by GCP).
Our system distinguishes between different levels of data sensitivity and adds additional layers of security accordingly.