Those engaging in Internet commerce dealing with financial transactions and personal information need to know that the communications are protected.
There are many facets to how we at Barrington Wealth Partners protect such information.
To prevent interception and manipulation of the data stream between browser and server, this site employs Secure Sockets Layer (SSL) encryption technology. Under SSL, each screen sent by a server is first encrypted and then decrypted on the user's PC before viewing, and vice versa. There are a number of parts of setting up an SSL connection also called “handshaking" where encryption certificates are exchanged. The certificate provides secure, authenticated communication in on-line applications.
This site uses GeoTrust certificates which are the most advanced and secure SSL Certificates on the market. GeoTrust certificates support 1024-bit key lengths and 128-bit SSL connections for 128-bit SSL web browsers. SSL also enables a web site to activate the browser's "LOCK" icon in the bottom right hand corner indicating data will be protected from interception or tampering.
TO VERIFY THE VALIDITY OF THE CERTIFICATE FOR THE DOMAIN FOR THIS SITE FOR THIS SITE, CLICK ON THE GEOTRUST SITE SEAL
Other Internet Security
To prevent manipulation on the browser side prior to transmission, to maintain state once logged in, this site stores information about the user and their session in temporary cookies. To prevent the user or someone else with physical access to the user's computer manually editing the cookie file and forging credentials by altering the contents of the cookie, this site employs dynamic session keys to ensure session integrity. At each page load, the key is validated to verify that the session information has not been altered. Similar precautions are taken within HTML forms to prevent "hijacking" of legitimate changes and access.
This data center with the servers also employs 24 / 7 managed firewall services and managed intrusion detection. Using the most advanced firewall procedures, all unnecessary ports at every connection to the Internet are closed. If there are suspicious traffic patterns, an alarm notifies the 24 / 7 attendants and they are investigated and the firewall adjusted right on the spot.
The least safe place to store information is an office. It takes a thief with very advanced expertise to hack a properly secured server, but any thief with a crowbar can open a locked door and walk out with a server stored in a standard office environment. Therefore we employ physical security impossible to match in any office. The servers are housed at a major international data center, and the stability and security of this Tier 1 facility is virtually impregnable. The center formerly was a cheque clearing and e-commerce hub for a major bank before a merger, and once held a billion dollars in bearer bonds.|
The data center is in a building in an industrial area that looks like any other building. However, there is no name on the building. There are carefully placed decorative boulders around the entrance to block truck bombs. Even then, that is just the first set of walls. The design of the building is like an arena with concentric rings around the periphery of the data hub where a unique, multiple air-filtering system is located.
The walls of the building are certified to be NATO quality small bore missile proof. In the reception area you are greeted by 24 / 7 guards behind bulletproof glass who can push one button and multiple police cruisers arrive within a minute from 2 police stations nearby.
After providing identification, once inside, any visitor is escorted and needs to pass through with multiple “mantraps”, which are corridors where the first door needs to be locked before the next door is opened.
The servers themselves are in locked secure cages with video surveillance.
Operational Risks are Mitigated
It does not matter how secure the communications are if the servers are frequently down or slow. Therefore the data centre has taken multiple precautions which we will outline here. As a result, our servers have many years of an almost unprecedented uptime track record.
Further, they are rocket fast as they are not overloaded. There are at least 5 servers in operation in the locked cage, and any one of these could handle the entire load on their own. If a site needs to be swapped between servers, this can be done in minutes.
Each server has quadruple redundant connected to diversely routed dual 100 Megabit per second Ethernet connections directly to the Internet backbone (67 times faster than a T1, in both upload and download directions).
There are no routers with a single point of failure (a common problem), but rather twin redundant $150,000 CISCO switches handle the Ethernet traffic inside the data centre.
There are separate redundant links to 2 different city hydro sub-stations right to each server which has two plugs and dual power supplies, one to each power channel. There are multiple layers of back-up power generation (three diesel generators that scramble in less than a minute, and only one is required, back-up batteries and two UPS systems consisting of five modules that enable the centre to be self-sufficient for over seven days without refueling. During the great eastern blackout of August 15, 2003, there were no outages.
The multiple redundant air-filtering system located around the periphery of the data hub supported by direct digital building monitoring system encompassing over 2,000 individual points such as water, temperature, cooling and heating, and sophisticated fire suppression system.
Each server utilizes hot-swappable storage, which means a drive can fail, be pulled out of its socket, a new drive inserted, all while the server is running and with no loss of data or service. Even with a failed drive, the server will run indefinitely. This is backed by a 24 / 7 four-hour parts and service contract and 24x7 monitoring of network connection and server availability. This feature has been tested with success. If a drive is replaced, the old drive is retained and wiped of data before returning to the manufacturer.
In addition to all of these precautions, full backups of all data are performed nightly at a secondary location, which in turn are then backed up and stored on storage media such as tapes, CD ROM or DVDs.