Cyber
security
policy

Cyber Security Policy By Future Systems LLC.

About Future Systems

Recognized as a leading Web & App Development Company, Future Systems was established in 2017. Originally focused on website development, Future Systems has expanded its services to include web app development, software development, mobile game development, UI/UX design, and more. With a team of over 20 experienced professionals, Future Systems delivers innovative solutions using cutting-edge technologies like Artificial Intelligence, Machine Learning, Augmented Reality, and more.

With a Diverse Portfolio

With a portfolio of 1000+ successful projects, Future Systems serves clients across various industries such as crypto, healthcare, education, finance, and retail. Our expertise spans 50+ Apps, 500+ Websites, 20+ AI & IoT Solutions, 10+ Games, and 100+ other projects. 

Our Global Presence

Headquartered in Armenia, Yerevan, Future Systems operates globally, with offices in Armenia, Israel, and Sweden. Our commitment to excellence has enabled us to earn a reputation as a trusted technology partner.

Network Security

In Office Premises

At Future Systems, we prioritize network security within our office premises. We utilize robust Sophos firewalls to regulate internet access, granting credentials exclusively to authorized employees. The firewall logs all activities, adhering to predefined rules. Access to Sophos-authorized internet is granted based on specific roles and seniority levels.

Cloud Network

For development projects, we utilize secure SSL-encrypted APIs and third-party integrations. Advanced security measures such as Web Application Firewalls (WAF) may be employed if necessary. Our cloud security protocols are customized according to client requirements.

Mobile Device Security

Company-provided mobile devices are solely for official use. These devices are password-protected, and only authorized employees have access. Mobile devices are submitted to authorized personnel at the end of each day, ensuring data security. Our centralized approach to device management facilitates secure and accessible data handling.

Use and Storage of Personally Identifiable Information & Notification

Personally identifiable information and notifications are stored on secure cloud networks. Only authorized personnel with access credentials can access this information. Our security officers maintain access records in a secure and non-shareable manner.

Notification System

Multiple login attempts trigger text messages or email notifications for enhanced security.

Employee Use of Social Networking Websites

Social networking access requests are evaluated based on specific criteria. Social networking access is granted for specific purposes, such as third-party platform integration. Our firewall records all internet-based activities.

Use of Wi-Fi Networks

All Wi-Fi networks are password protected, adhering to the WPA2 security standard. Wi-Fi access is limited to authorized personnel, with higher authorities having access to dedicated networks.

Data Backup Procedure

Regular auto-backups from our internal system to cloud servers occur monthly. Local system backups are not maintained, ensuring data security.