Security

We follow practical, industry-standard controls and iterate as we grow.

Encryption

  • • Daily check-ins and notes are encrypted at rest in our databases.
  • • All data is encrypted in transit via HTTPS (TLS).
  • • At rest encryption uses managed keys provided by our infrastructure providers.

Access controls

  • • Least-privilege access to production systems.
  • • Separate development vs production environments.
  • • Admin actions are logged and reviewed.

Backups & resilience

  • • Regular automated backups of core data stores.
  • • Monitored infrastructure and basic alerting.
  • • Disaster recovery testing as we scale.

Vulnerabilities

  • • Dependency updates and security patches are part of routine work.
  • • We triage reported issues quickly; contact security@sylure.com.
  • • We’ll disclose material incidents and next steps promptly.

Questions?

Reach us at security@sylure.com. We’re happy to share more details under NDA if needed.