security_01
Security
We adhere to the main cybersecurity frameworks of financial regulations, user trust is the most important thing for Addika.
Security standards
We comply with the security requirements of all our stakeholders through armored storage on trusted cloud servers.
Your security is our top concern.
Addika's infrastructure has a high level of cybersecurity.
security_03
Data encryption
Each of your data is encrypted with a unique key, which is protected by the master certification key. This key is also updated periodically.
security_03
Anonymous data
All information in our database remains anonymous as a preventive method for worst-case scenarios.
security_03
2FA login
In addition to a password, you can generate a token that complements the security of your login.
security_03
Access control
Only you, from the control panel, can control access to your account.
security_03
Good practices and processes
All platform updates are made indirectly. In this way, our programmers do not have contact with the information.
security_03
Monitoring
We have an internal control system that allows us to generate contingency and recovery protocols in case of the slightest unusual movement.
FAQS
Are you interested in learning more about our security protocols?
Contact us for more detailed information