Security of personal data
Ensuring the information security of the Fund is achieved by implementing a set of necessary processes and measures, which are represented by policies, methods, procedures and software functions. These measures have been implemented, improved and ensure the information security of the Fund.
The Fund's information resources are systematically scanned for vulnerabilities. Vulnerability scanning tools are one of the most important tools in information security as vulnerabilities appear every day. Identified vulnerabilities are eliminated in accordance with information security requirements.
In addition, a new generation of hardware and software is used that filters local and incoming traffic, thereby ensuring the highest degree of protection of the Fund’s information system from known and unknown cyber threats. Additionally, in order to prevent zero-day threats, a hardware and software system is used that provides analysis and emulation of files and attachments to protect against complex and targeted attacks.
The Fund's information resources are systematically scanned for vulnerabilities. Vulnerability scanning tools are one of the most important tools in information security as vulnerabilities appear every day. Identified vulnerabilities are eliminated in accordance with information security requirements.
In addition, a new generation of hardware and software is used that filters local and incoming traffic, thereby ensuring the highest degree of protection of the Fund’s information system from known and unknown cyber threats. Additionally, in order to prevent zero-day threats, a hardware and software system is used that provides analysis and emulation of files and attachments to protect against complex and targeted attacks.