Security

Protecting your data is our top priority

Our Security Commitment

At Wellstab, we implement industry-leading security measures to protect your account and data. Our security practices are designed to meet the highest standards of safety and reliability.

Data Encryption

All sensitive data is encrypted both in transit (TLS 1.2+) and at rest (AES-256). We implement perfect forward secrecy to maximize protection.

Multi-Factor Authentication

We support multiple 2FA methods including TOTP apps, hardware security keys, and SMS verification to secure your account access.

Secure Infrastructure

Our systems are hosted in SOC 2 Type II certified data centers with biometric access controls, 24/7 monitoring, and redundant power supplies.

Security Features

Account Protection

  • Two-factor authentication (2FA) with multiple verification methods
  • Biometric login options (Face ID, Touch ID, Windows Hello)
  • Session timeout and automatic logout after inactivity
  • Login attempt monitoring and brute force protection
  • Email notifications for sensitive account actions

Data Security

  • End-to-end encryption for all sensitive communications
  • Regular security audits and penetration testing
  • Data minimization principles - we only collect what we need
  • Automatic data backups with point-in-time recovery
  • Secure deletion processes for data no longer needed

Platform Security

  • DDoS protection and mitigation services
  • Web application firewall with custom rules
  • Regular software updates and patch management
  • Containerized microservices architecture with isolation
  • Zero-trust network access controls

Security Best Practices

For Users

  • Enable two-factor authentication for your account
  • Use a unique, strong password for your Wellstab account
  • Be cautious of phishing attempts - we'll never ask for your password
  • Keep your devices and browsers up to date

From Wellstab

  • Regular third-party security audits and penetration tests
  • Employee security training and background checks
  • Bug bounty program to reward security researchers
  • Incident response plan and 24/7 security monitoring

Report a Security Concern

If you've discovered a security vulnerability, please responsibly disclose it to our security team.

Security Disclosure