Our 3 pillars of security: Data security, infrastructure, and people
When you share your clients' sensitive financial data with us, please be assured it's in the right hands. We exceed the industry standards when it comes to data security.
Our offices adhere to international best practices for information security management.
Secure data sharing
Here's the thing: your sensitive data doesn't leave your home turf. Our accountants only access it remotely. The overall control of the files always remains with you. That's a promise!
Our team uses secure remote desktop software such as Citrix and GoToMyPC or use the VPN to log in and access the data on the system and do the job. Let's connect if you need guidance setting up hosted desktops.
We have an efficient outsourcing process
There’s no denying that we’re a process-oriented outsourcing company. We do what’s essential for you, not us.
Preliminary discussion
This is the step where we get to know you, your business requirements, why you want to outsource, and what you hope to achieve with our help. Your input helps us prep accordingly.
SLAs Setup
Once the preliminary talks are over, the Stellaripe team dives deep into understanding your document operating procedures. This helps us set the right SLAs for you.
Contract agreement
Once you sign off the SLAs set by us, we make things official by signing an agreement that comprises critical details such as the deadlines of the project, data protection clauses, team members involved, and so on.
Service commencement
Once the formalities are over, and we both have signed and sorted the paperwork, our accountants take over your pre-decided functions and start the job.
Weekly meetings
We are methodical in our approach and conduct meetings once every week to review the work done in the past week and set deadlines for the next. This is also where we hear your grievances and improve our processes accordingly.
The 5-step Stellaripe approach
We log in to your system using a remote desktop system.
We access your files on your system. There’s no need for us to transfer them to our servers.
We finish our job and send it across to you for review and feedback.
Once you share your input, we make the changes and share the final version of the task.
Once you give us the green signal, we share a final report of the job finished.
The 5-step Stellaripe approach
We log in to your system using a remote desktop system.
We access your files on your system. There’s no need for us to transfer them to our servers.
We finish our job and send it across to you for review and feedback.
Once you share your input, we make the changes and share the final version of the task.
Once you give us the green signal, we share a final report of the job finished.
Data security
The security of your data and your clients’ data is our #1 priority. We understand we’re dealing with other people’s highly personal information, tax records, and financial data, so we’re extra vigilant. Here’s a list of specific processes we/ve implemented to ensure the sensitive information always stays protected.
Information security
- Firewall defenses
- IP address restrictions
- Breach notification system
- Destruction register maintained
- Anti-virus/Spam/Spyware manager
- Limited email access unless necessary
- Whitelisting approach on visiting websites
- Mandatory data security training sessions for staff
- 256-bit bank-level encryption for data transfer and management
- Password Vault used for default password storage with applied IP address restrictions
Physical security
- Disabled USB ports
- Limited printer access
- Daily internal data back-up
- Desktops connected to the local server
- Save or store data feature disabled on desktop
- Biometric scanners and access card-based security
- Continuously monitored office premises and web-access
Infrastructure
Not only is our network bulletproof, but also our facility is secure. At Stellaripe, we have deployed state-of-the-art infrastructure to protect your data, minimizing the flow of new cyber risks.
- Video conferencing facility
- Dell servers and computers
- Dual screens for increased efficiency
- US, UK, AUS, and NZ phone numbers
- Authorized staff must pass biometric systems
- Compliant internal data processes and storage
- Strict procedures for data security and quality management systems
People processes
Regardless of how safe and secure our network and infrastructure are, nothing would matter if the employees don’t take responsibility for the job. Our dedicated and reliable staff won’t disappoint you.
- US, UK, AUS, and NZ accounting experience
- Confidentiality agreement with all staff members
- Full time, competent staff to address issues related to IT security
- Qualified, experienced, and trained Xero and QB-certified accountants
- Experienced in leading desktop and cloud accounting software solutions