SECURITY POLICY

SECURITY POLICY

SECURITY POLICY

Last Updated: August 27, 2025


Introduction


At Strategic4, the trust of our clients is the cornerstone of our business. We are deeply committed to protecting the confidentiality, integrity, and availability of the data you entrust to us. This document outlines the security measures we have implemented to safeguard your information.


Governance and Compliance

Our security program is designed to align with global best practices and meet our legal and regulatory obligations.

Security Frameworks: While we do not currently hold formal ISO 27001 or SOC 2 certifications, our internal security program is built upon the principles and controls outlined in these leading international standards. We are committed to a process of continuous improvement and risk management.


Data Privacy Compliance: We are committed to ensuring that all client and personal data is handled in compliance with major data protection regulations, including the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). For more details, please see our Privacy Policy.


Data Security

We employ multiple layers of protection for the data we manage.

Cloud Infrastructure: All of our core systems and client data are hosted on leading, secure cloud platforms like Amazon Web Services (AWS) or Microsoft Azure. This allows us to leverage their world-class physical security, infrastructure, and operational best practices.


Encryption: Your data is protected at all times using strong encryption.

Encryption in Transit: All data transferred between you and our systems, or between our internal systems, is encrypted using industry-standard TLS 1.2 or higher.

Encryption at Rest: All client files and data stored on our servers and in our databases are encrypted using AES-256, one of the strongest block ciphers available.


Infrastructure and Network Security

Our networks are engineered to be secure and resilient.

Access Control: Access to sensitive client data is strictly controlled. We adhere to the principle of least privilege, meaning employees are only granted the minimum level of access required to perform their job functions. All access is regularly reviewed and audited.


Secure Network Configuration: We use firewalls, virtual private clouds (VPCs), and other network segmentation techniques to isolate critical systems and protect them from unauthorized access.


Intrusion Detection: We utilize monitoring and logging systems to detect and alert our team to anomalous or suspicious activity across our networks and applications.


Operational and Organizational Security

Security is embedded in our company culture and daily operations.

Endpoint Security: All company devices (laptops) are centrally managed, configured with full-disk encryption, and protected by anti-malware software, firewalls, and automatic security updates. We have the ability to remotely wipe any device that is lost or stolen.


Security Training: All Strategic4 employees undergo mandatory security awareness training upon hiring and on an annual basis to ensure they are equipped to identify and respond to emerging threats.


Vendor Security: We conduct security and privacy due diligence on all third-party vendors (such as HubSpot and Framer) that may handle client or company data to ensure they meet our security standards.


Secure Data Handling: We maintain strict internal policies for the secure handling, storage, and disposal of confidential client information throughout the entire project lifecycle.


Incident Management: We have a formal incident response plan in place to ensure we can respond to, investigate, and notify relevant parties of any potential security incident swiftly and effectively.


Vulnerability Disclosure

We are committed to working with the security community to resolve any potential vulnerabilities. If you believe you have discovered a security issue in our website or systems, please contact us directly.


Email: security@strategic4.com


Please provide a detailed description of the potential vulnerability so our team can investigate. We appreciate your help in keeping Strategic4 and our clients secure.

Last Updated: August 27, 2025


Introduction


At Strategic4, the trust of our clients is the cornerstone of our business. We are deeply committed to protecting the confidentiality, integrity, and availability of the data you entrust to us. This document outlines the security measures we have implemented to safeguard your information.


Governance and Compliance

Our security program is designed to align with global best practices and meet our legal and regulatory obligations.

Security Frameworks: While we do not currently hold formal ISO 27001 or SOC 2 certifications, our internal security program is built upon the principles and controls outlined in these leading international standards. We are committed to a process of continuous improvement and risk management.


Data Privacy Compliance: We are committed to ensuring that all client and personal data is handled in compliance with major data protection regulations, including the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). For more details, please see our Privacy Policy.


Data Security

We employ multiple layers of protection for the data we manage.

Cloud Infrastructure: All of our core systems and client data are hosted on leading, secure cloud platforms like Amazon Web Services (AWS) or Microsoft Azure. This allows us to leverage their world-class physical security, infrastructure, and operational best practices.


Encryption: Your data is protected at all times using strong encryption.

Encryption in Transit: All data transferred between you and our systems, or between our internal systems, is encrypted using industry-standard TLS 1.2 or higher.

Encryption at Rest: All client files and data stored on our servers and in our databases are encrypted using AES-256, one of the strongest block ciphers available.


Infrastructure and Network Security

Our networks are engineered to be secure and resilient.

Access Control: Access to sensitive client data is strictly controlled. We adhere to the principle of least privilege, meaning employees are only granted the minimum level of access required to perform their job functions. All access is regularly reviewed and audited.


Secure Network Configuration: We use firewalls, virtual private clouds (VPCs), and other network segmentation techniques to isolate critical systems and protect them from unauthorized access.


Intrusion Detection: We utilize monitoring and logging systems to detect and alert our team to anomalous or suspicious activity across our networks and applications.


Operational and Organizational Security

Security is embedded in our company culture and daily operations.

Endpoint Security: All company devices (laptops) are centrally managed, configured with full-disk encryption, and protected by anti-malware software, firewalls, and automatic security updates. We have the ability to remotely wipe any device that is lost or stolen.


Security Training: All Strategic4 employees undergo mandatory security awareness training upon hiring and on an annual basis to ensure they are equipped to identify and respond to emerging threats.


Vendor Security: We conduct security and privacy due diligence on all third-party vendors (such as HubSpot and Framer) that may handle client or company data to ensure they meet our security standards.


Secure Data Handling: We maintain strict internal policies for the secure handling, storage, and disposal of confidential client information throughout the entire project lifecycle.


Incident Management: We have a formal incident response plan in place to ensure we can respond to, investigate, and notify relevant parties of any potential security incident swiftly and effectively.


Vulnerability Disclosure

We are committed to working with the security community to resolve any potential vulnerabilities. If you believe you have discovered a security issue in our website or systems, please contact us directly.


Email: security@strategic4.com


Please provide a detailed description of the potential vulnerability so our team can investigate. We appreciate your help in keeping Strategic4 and our clients secure.

Last Updated: August 27, 2025


Introduction


At Strategic4, the trust of our clients is the cornerstone of our business. We are deeply committed to protecting the confidentiality, integrity, and availability of the data you entrust to us. This document outlines the security measures we have implemented to safeguard your information.


Governance and Compliance

Our security program is designed to align with global best practices and meet our legal and regulatory obligations.

Security Frameworks: While we do not currently hold formal ISO 27001 or SOC 2 certifications, our internal security program is built upon the principles and controls outlined in these leading international standards. We are committed to a process of continuous improvement and risk management.


Data Privacy Compliance: We are committed to ensuring that all client and personal data is handled in compliance with major data protection regulations, including the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). For more details, please see our Privacy Policy.


Data Security

We employ multiple layers of protection for the data we manage.

Cloud Infrastructure: All of our core systems and client data are hosted on leading, secure cloud platforms like Amazon Web Services (AWS) or Microsoft Azure. This allows us to leverage their world-class physical security, infrastructure, and operational best practices.


Encryption: Your data is protected at all times using strong encryption.

Encryption in Transit: All data transferred between you and our systems, or between our internal systems, is encrypted using industry-standard TLS 1.2 or higher.

Encryption at Rest: All client files and data stored on our servers and in our databases are encrypted using AES-256, one of the strongest block ciphers available.


Infrastructure and Network Security

Our networks are engineered to be secure and resilient.

Access Control: Access to sensitive client data is strictly controlled. We adhere to the principle of least privilege, meaning employees are only granted the minimum level of access required to perform their job functions. All access is regularly reviewed and audited.


Secure Network Configuration: We use firewalls, virtual private clouds (VPCs), and other network segmentation techniques to isolate critical systems and protect them from unauthorized access.


Intrusion Detection: We utilize monitoring and logging systems to detect and alert our team to anomalous or suspicious activity across our networks and applications.


Operational and Organizational Security

Security is embedded in our company culture and daily operations.

Endpoint Security: All company devices (laptops) are centrally managed, configured with full-disk encryption, and protected by anti-malware software, firewalls, and automatic security updates. We have the ability to remotely wipe any device that is lost or stolen.


Security Training: All Strategic4 employees undergo mandatory security awareness training upon hiring and on an annual basis to ensure they are equipped to identify and respond to emerging threats.


Vendor Security: We conduct security and privacy due diligence on all third-party vendors (such as HubSpot and Framer) that may handle client or company data to ensure they meet our security standards.


Secure Data Handling: We maintain strict internal policies for the secure handling, storage, and disposal of confidential client information throughout the entire project lifecycle.


Incident Management: We have a formal incident response plan in place to ensure we can respond to, investigate, and notify relevant parties of any potential security incident swiftly and effectively.


Vulnerability Disclosure

We are committed to working with the security community to resolve any potential vulnerabilities. If you believe you have discovered a security issue in our website or systems, please contact us directly.


Email: security@strategic4.com


Please provide a detailed description of the potential vulnerability so our team can investigate. We appreciate your help in keeping Strategic4 and our clients secure.

Address

Strategic4 FZC LLC


KSA Office

Al Harma
King Abdullah Road
Building No. 3660
Riyadh, Saudi Arabia


UAE Office

Business Centre
Sharjah Publishing City
Free Zone
Sharjah, UAE

Follow Us

© Copyright

2025