Your Data Is Safe With Us

YaadBooks protects your financial data with the same security standards used by banks. We take security seriously because your business depends on it.

AES-256
Encryption at Rest
TLS 1.3
Encryption in Transit
99.9%
Uptime SLA
24/7
Security Monitoring

Bank-Grade Encryption

Your data is protected at every step

Data in Transit

  • TLS 1.3 encryption on all connections
  • HTTPS enforced everywhere
  • Perfect forward secrecy

Data at Rest

  • AES-256 database encryption
  • Encrypted file storage
  • Secure key management

Access Protection

Multiple layers of authentication security

Password Security

  • • Bcrypt hashing with salt
  • • Minimum strength requirements
  • • Secure password reset flow
  • • Breach detection alerts

Session Security

  • • Short-lived access tokens (15 min)
  • • Secure token refresh
  • • Single-session enforcement
  • • Automatic logout on inactivity

Brute Force Protection

  • • Rate limiting on login attempts
  • • Progressive delays after failures
  • • IP-based throttling
  • • Suspicious activity alerts

Role-Based Access

  • • Owner, Admin, Staff roles
  • • Granular permissions
  • • Feature-level access control
  • • Complete audit trail

Data Isolation & Backup

Your data is yours, protected and recoverable

Multi-Tenant Isolation

Each business has completely isolated data. Your information is never visible to other accounts — even in error scenarios.

  • Logical database separation
  • Company-scoped API access
  • IDOR attack prevention

Automatic Backups

Your data is automatically backed up multiple times daily. We can restore your account to any point in the last 30 days.

  • Hourly incremental backups
  • Daily full backups
  • 30-day point-in-time recovery

Infrastructure Security

Enterprise-grade hosting and monitoring

Cloud Hosting

Hosted on SOC 2 Type II certified infrastructure with redundant systems

DDoS Protection

Automatic attack mitigation keeps your service running during threats

24/7 Monitoring

Real-time intrusion detection and automated threat response

Compliance & Standards

Meeting local and international requirements

🇯🇲 Jamaican Compliance

  • • Data Protection Act 2020 compliant
  • • TAJ reporting standards
  • • GCT calculation accuracy verified
  • • Statutory deduction compliance

🌍 International Standards

  • • SOC 2 compliant infrastructure
  • • OWASP security guidelines
  • • Regular penetration testing
  • • Responsible disclosure program

Complete Audit Trail

Every action is logged for accountability

YaadBooks maintains a comprehensive audit log of all activities in your account:

  • Login and logout events
  • Invoice creation and edits
  • Payment recordings
  • User permission changes
  • Settings modifications
  • Data exports

Report a Security Issue

Found a vulnerability? We appreciate responsible disclosure. Please report security issues to our security team and we'll respond within 24 hours.

Questions About Security?

Our team is happy to discuss our security practices in more detail.