Bank-Grade Encryption
Your data is protected at every step
Data in Transit
- TLS 1.3 encryption on all connections
- HTTPS enforced everywhere
- Perfect forward secrecy
Data at Rest
- AES-256 database encryption
- Encrypted file storage
- Secure key management
Access Protection
Multiple layers of authentication security
Password Security
- • Bcrypt hashing with salt
- • Minimum strength requirements
- • Secure password reset flow
- • Breach detection alerts
Session Security
- • Short-lived access tokens (15 min)
- • Secure token refresh
- • Single-session enforcement
- • Automatic logout on inactivity
Brute Force Protection
- • Rate limiting on login attempts
- • Progressive delays after failures
- • IP-based throttling
- • Suspicious activity alerts
Role-Based Access
- • Owner, Admin, Staff roles
- • Granular permissions
- • Feature-level access control
- • Complete audit trail
Data Isolation & Backup
Your data is yours, protected and recoverable
Multi-Tenant Isolation
Each business has completely isolated data. Your information is never visible to other accounts — even in error scenarios.
- Logical database separation
- Company-scoped API access
- IDOR attack prevention
Automatic Backups
Your data is automatically backed up multiple times daily. We can restore your account to any point in the last 30 days.
- Hourly incremental backups
- Daily full backups
- 30-day point-in-time recovery
Infrastructure Security
Enterprise-grade hosting and monitoring
Cloud Hosting
Hosted on SOC 2 Type II certified infrastructure with redundant systems
DDoS Protection
Automatic attack mitigation keeps your service running during threats
24/7 Monitoring
Real-time intrusion detection and automated threat response
Compliance & Standards
Meeting local and international requirements
🇯🇲 Jamaican Compliance
- • Data Protection Act 2020 compliant
- • TAJ reporting standards
- • GCT calculation accuracy verified
- • Statutory deduction compliance
🌍 International Standards
- • SOC 2 compliant infrastructure
- • OWASP security guidelines
- • Regular penetration testing
- • Responsible disclosure program
Complete Audit Trail
Every action is logged for accountability
YaadBooks maintains a comprehensive audit log of all activities in your account:
- Login and logout events
- Invoice creation and edits
- Payment recordings
- User permission changes
- Settings modifications
- Data exports
Report a Security Issue
Found a vulnerability? We appreciate responsible disclosure. Please report security issues to our security team and we'll respond within 24 hours.
Questions About Security?
Our team is happy to discuss our security practices in more detail.