Information Security Policy

How we classify and handle official information to guard against information compromise

WordPress Support Services & Website Maintenance

WordPress websites receive ongoing assistance and upkeep from WordPress Pro Support. WordPress Core and Plugin upgrades, security monitoring, off-site backups, support, and custom development are just a few of the services we offer.

Information security is a crucial component of WordPress Pro Support’s strategy for providing high-quality services to our clients. The protection of our services, as well as the confidentiality, integrity, and availability of the customer information that is provided to us, is the main goal of our information security. We have put into place an Information Security Management System (ISMS) in accordance with ISO 27001:2013’s specifications.

We are dedicated to enhancing our systems continuously, which includes meeting all legal and pertinent information security criteria.

Our systems were created with the idea of constant progress, which is gauged by our objectives.

Senior management establishes our information security goals, which are at least yearly reviewed to make sure they have been met and to assess how well they still align with the company’s strategic direction:

Observe and abide by all applicable laws pertaining to the protection and security of the information we possess, including the Data Protection Act of 2018 and the EU General Data Protection Regulation (GDPR).

Make sure that customers trust the security of our information and feel secure knowing that we are attentive to their security issues.

Make sure that all threats to our systems are handled quickly and effectively.

Review the market often to make sure that future information security threats are risk assessed and addressed. Take measures to address information security risks that are found in new projects and our current business plan.

As decided by our internal audit programme, senior management is in charge of making sure that the ISO requirements and our processes are followed. Different system components have distinct responsibilities that are assigned to the right employees within the company or, if necessary, subcontracted.

To make sure we are adhering to ISO norms, qualified personnel audits our processes and systems. Any violations of the rules are immediately fixed, and steps are taken to keep them from happening again.

This regulation is

Supported by additional system-wide policies that are distributed to all concerned staff members through the proper channels.

Reviewed every year by our senior management to make sure it still meets the needs of the company and our information security goals. Each time an update is necessary, it is reissued to all concerned parties.

Via our training and awareness programme, it is accessible to every person in the company, and it is posted on our website for anyone who might be interested.