Within Teamwork Desk, your security is very important to us. Information of various security aspects can be found below.
Certification and Accreditation's in Amazon Web Services
Information on Certifications and Accreditations in AWS can be found here.
Teamwork Desk server security
Only select Teamwork.com staff have authorization to access the servers.
We also have a code of ethics that ensures that we will never breach customer confidentiality.
All servers within the AWS cloud have secure architecture and contain a number of capabilities that restrict unauthorized access or usage without sacrificing the flexibility that customers demand.
Teamwork Desk physical server security
Amazon has many years of experience in designing, constructing, and operating large-scale data centers.
AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate business need know the actual location of these data centers, and the data centers themselves are secured with an array of physical controls to prevent unauthorized access.
Amazon EC2 Cloud hosting – Amazon’s platform gives us the advantage of being able to quickly increase the RAM and processing power of servers at the touch of a button. Most importantly, it allows us to quickly bring new servers online to meet rising demands.
The other massive advantage is far more reliability when it comes to protecting your data. Hardware failures are a lot less in EC2, but if they do occur, everything is well backed up and recovery is much easier and faster.
We provide SSL connections for all *.teamwork.com sites. This ensures that your communication with our server is safe from prying eyes.
Teamwork Desk password tips and info
Passwords for Teamwork Desk are case sensitive meaning that 'hellO' and 'hello' will not be treated the same when logging in.
When creating a password, you can use numbers or symbols.
When making or changing passwords in Teamwork.com, the strength is indicated, aim for a 'Strong' password.
For more information, see: Whitelisting and blacklisting