Security Statement

Black Mountain Software (BMS) values the trust you place in us. We take our responsibility of protection seriously and strive to achieve the best possible practices in providing a safe and secure experience.

Security Procedures

BMS security policies and procedures are routinely reviewed and updated. Proactive and preventative measures are applied as part of our regular duties, as well as emergency response strategies. Our engineering team is actively aware of newly reported threats, discovered through internal or external sources, and takes immediate action to mitigate any negative ramifications. Every effort is made to apply critical patches as soon as possible.

Remote Safety

BMS Cloud servers prevent any connection from users that have not been properly verified in our system. Connections are established with a secure and encrypted connection. Our servers are hosted by a service provider with industry leading qualifications in security, reliability, and responsiveness. BMS Cloud servers leverage multiple safeguards of protection to ensure the safest experience we can provide.

Monitoring

Our security focused engineers routinely monitor reports of access to our BMS Cloud servers. Our monitoring includes automated alerts as well as personal scrutiny by our professional staff. BMS engineers vigilantly watch for suspicious activity and pursue investigations when necessary.

Reliability

BMS Cloud servers maintain scheduled nightly backups of client resources. The structure of our backup protection is robust, with preventative measures in place that can withstand emergency situations and still have quality backups available. BMS takes advantage of reliable, proven technologies to guarantee the safety of our client data. We constantly assess the most optimal means of securing and maintaining backups.

Responsiveness

Security focused engineers are professionally trained to respond to events as immediately as possible. BMS engineering undertakes frequent emergency response practice scenarios, following with industry best practices, to safeguard that genuine emergencies are dealt efficiently and effectively.

Protection Verification

BMS enlists external security investigations to analyze the protections we have in place. We meet the highest standards of safety, verified by experts in the security community. While we regularly conduct internal assessments of our own systems, we appreciate and respect the perspective and authenticity an outside investigation can provide. For further information, please refer to our Letter of Attestation or log4j Letter of Attestation.

Physical Security

BMS servers are hosted within professionally observed world class data centers. Physical access to data centers is granted on the principle of least privilege, logging and monitoring all accepted requests. Physical protections also include 24×7 logged CCTV recordings, data center entry points manned by authorized security staff, and automated intrusion detection at every ingress and egress point to the server rooms.

Stay Connected with Black Mountain Software

If you sign up for Black Mountain Software emails, about 4 times per year you will receive a special email designed for organizations like yours that are not already Black Mountain customers. We won’t clutter your inbox, and we will provide information relevant and helpful to you. And don’t worry, your email address is never sold or given out to third parties.

Select the Email Updates You'd Like to Receive:

Other Ways to Stay Connected:

Subscribe to the Blog Subscribe to City Clerk Cafe Connect with LinkedIn
Follow on Facebook Follow on Twitter Connect on YouTube