Physical and Network Security

The Udexx Data Centers are monitored 24/7/365 and provide full data recovery within 24 hours in the event of major disaster.

Thank you for reading this post, don't forget to subscribe!

Data center features include:

  • Multiple fiber trunks and mirrored RAID storage
  • Standby servers and redundant network components
  • Redundant uninterruptible power supplies and parallel redundant generator

Application Security

With security features built into the Applications, you can prevent outside attacks and ensure that the right people get the right level of access to your Sage Intacct solution. Features include:

  • Highly granular level of control over user access
  • Option of requiring 2-step user verification every time a user signs on through an unrecognized device
  • Enforced password changes and automatic session timeouts
  • Option to set acceptable IP ranges from which users may log in

System Security

Applications are designed to prevent unauthorized programs, systems, and users from gaining access to or control of system processes, resources, and data.  Features developed to protect your business include:

  • SSAE 18 SOC 1 Type II audited twice per year
  • SOC 2 Type II audited
  • PCI DSS Level 1 certified
    Udexx is responsible for maintaining all applicable PCI DSS requirements to the extent Sage Intacct handles, has access to, or otherwise stores, processes, or transmits customer’s cardholder data or sensitive authentication data, or manages customer’s cardholder data environment on behalf of a customer.
  • Tightly restricted access to production data including biometric access controls
  • Hardened networks and firewalls
  • Real-time activity log tracking
  • Automated security scanning and third-party white hat penetration testing
  • Virus resistance reinforced through software architecture
  • Oracle database secured with advanced security
  • Minimum 128-bit encryption for all data transmission

Data-Level Security

Xero and Acumatica is built on the highly reliable SQL database infrastructure, helping to ensure you can access information at any time of day, every day of the year. Data-security measures include:

  • Full daily backups to multiple locations
  • Continuous backups of transaction data
  • Secure streaming of transaction data to remote disaster recovery center

Udexx Xero Platform Services Security

Security assurance

Udexx Xero is certified as compliant with ISO/IEC 27001:2013 which is globally recognized as the premier information security management system (ISMS) standard. Xero achieved certification by developing and implementing a robust security management program, including a comprehensive Information Security Management System (ISMS).

Udexx Xero has produced a Service Organization Control (SOC 2) report. The report is the result of an independent auditor’s examination of Xero’s cloud based accounting system relevant to the Trust Services Criteria for Security, Availability, and Confidentiality.

Udexx Xero complies with the Payment Card Industry Data Security Standard (PCI DSS). We’re a level 3 merchant and outsource our credit card processing functions to PCI DSS-compliant level 1 service providers. Xero is compliant with PCI DSS v3.2, SAQ A.

If you have questions, or would like to request the latest available SOC 2 report, ISO 27001 certificate or both, please send a mail to info@udexx.com and a Udexx Customer Experience representative will contact you.

Protecting your data

We’re committed to the security of our customers’ data and provide multiple layers of protection for the personal and financial information you trust to Xero.

You control access

As a Xero customer you have the flexibility to invite unlimited users into your account to collaborate on your data, and the person that holds the subscription has control over who has access and what they are able to do. Our customer support staff cannot access your information unless you invite them to help. Please see our privacy policy for further information.

User authentication

We provide standard access to the Xero software through a login and password. In addition we offer the option of using two-step authentication. This provides a second level of security for your Xero account. It means you’re also asked to enter a unique code generated by a separate authenticator app on your smartphone. We recommend you use two-step authentication as it reduces the risk of your Xero account being accessed if your password is compromised.

Data encryption

We encrypt all data that goes between you and Xero using industry-standard TLS (Transport Layer Security), protecting your personal and financial data. Your data is also encrypted at rest when it is stored on our servers, and encrypted when we transfer it between data centers for backup and replication.

Network protection

Xero takes a “defense in depth” approach to protecting our systems and your data. Multiple layers of security controls protect access to and within our environment, including firewalls, intrusion protection systems and network segregation. Xero’s security services are configured, monitored and maintained according to industry best practice. We partner with industry-leading security vendors to leverage their expertise and global threat intelligence to protect our systems.

Secure data centers

Xero’s servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. These controls include 24/7/365 monitoring and surveillance, on-site security staff and regular ongoing security audits. Xero maintains multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages.

Security monitoring

Xero’s Security team continuously monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.

Always there

Best in class availability

With a record of 99.97% uptime, Xero delivers best-in-class availability. We use multiple redundancy technologies for our hardware, networks, data centers and infrastructure. These ensure that if any component fails, Xero will keep on running – with little or no disruption to your service.

Built to perform at scale

Xero has been designed to grow with your business. Our high performance servers, networks and infrastructure ensure we can deliver quality service to you and our hundreds of thousands of other users.

Disaster recovery and readiness

Xero performs real-time data replication between our geographically diverse, protected facilities, to ensure your data is available and safely stored. This means that should even an unlikely event occur, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep Xero and your business running. We transmit data securely, across encrypted links.

Constant updates and innovation

We’re constantly enhancing Xero, delivering new features and performance improvements. Updates are delivered frequently, with the majority of them being delivered without interrupting our service and disrupting users.

Your online safety

We design security into Xero from the ground up. However, there can be risks to working and playing online. Whether you’re shopping, banking, doing your accounts, or simply checking your email, cyber criminals and scammers are always looking for ways to steal money or sensitive information.

There are precautions you can take to reduce the risks and help keep you safe from harm online. Take a few minutes to read our introduction to cloud security, and see below for information about how to identify and deal with scams and malicious ‘phishing’ emails.

Phishing and malicious emails

A phishing email is a favored way for cyber criminals to get access to your sensitive information, such as your usernames and passwords, credit card details, bank account numbers, etc. This kind of email may look as if it has come from a trustworthy source, but will attempt to trick you into:

  • clicking on a link that will infect your computer with malicious software
  • following a link to a fake (but convincing looking) website that will steal your login details
  • opening an attachment that will infect your computer.

Once you are hooked, the cyber criminal may be able to steal or extort money from you, or gather sensitive personal or business information that they can use for other attacks. However, you can protect yourself and your business by being aware of these scams, and by knowing what to look for that may help you identify a malicious email:

  • Incorrect spelling or grammar: legitimate organizations don’t always get it 100% right, but be suspicious of emails with basic errors.
  • The actual linked URL is different from the one displayed – hover your mouse over any links in an email (DON’T CLICK) to see if the actual URL is different.
  • The email asks for personal information that they should already have, or information that isn’t relevant to your business with them.
  • The email calls for urgent action. For example, “Your bank account will be closed if you don’t respond right away”. If you are not sure and want to check, then go directly to the bank’s website via the URL you would normally use, or phone them. Don’t click on the link in the email. The email says you’ve won a competition you didn’t enter, have a parcel waiting that you didn’t order, or promises huge rewards for your help. On the internet, if it sounds too good to be true then it probably isn’t true.
  • There are changes to how information is usually presented, for example an email is addressed to “Dear Sirs” or “Hello” instead of to you by name, the sending email address looks different or complex, or the content is not what you would usually expect.

These are just a few of the things to watch out for. There’s a lot more information and tips available on the web. But even if there’s nothing specific you can point to, the email may just not “feel” right. Trust your instincts, and don’t get hooked.

If you suspect you’ve received a phishing or malicious email, and it says it’s from Xero or uses Xero’s logo, do not click on anything in the email – please report it by forwarding the email to phishing@xero.com.

Try to avoid a phishing attack by following these rules

If you receive a suspicious email make sure you:

  1. DO NOT CLICK on any link or attachment contained in the email.
  2. DO NOT REPLY to the email.
  3. Report the email by forwarding it to phishing@xero.com if it is Xero-branded.
  4. Delete the email.
  5. Update your anti-malware (anti-virus, anti-spyware) and run a full scan on your computer.

Security Noticeboard

Xero’s Security Noticeboard is where you’ll find updates on known phishing and other scams targeting our community, as well as any recommendations on how to protect yourself from them. We’ll also post other security related news from Xero on the Noticeboard. If you have questions about security matters, or notice any unusual activity or emails related to Xero, please contact our Support team.