{"id":872,"date":"2026-01-08T16:28:34","date_gmt":"2026-01-08T16:28:34","guid":{"rendered":"https:\/\/www.millboard.com\/en-gb\/?page_id=872"},"modified":"2026-03-09T18:40:40","modified_gmt":"2026-03-09T18:40:40","slug":"security-overview","status":"publish","type":"page","link":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/","title":{"rendered":"Security Overview"},"content":{"rendered":"<header class=\"page-header wp-block alignfull has-brand-1-background-color has-background page-header--type--page has-breadcrumbs\">\n    <div class=\"page-header__inner\">\n                    <!-- Breadcrumbs -->\n            <div class=\"page-header__breadcrumbs\">\n                <nav class=\"breadcrumbs\">\n    <span class=\"breadcrumbs__yoast-wrapper\"><span><a href=\"https:\/\/www.millboard.com\/en-us\/\">Home<\/a><\/span><\/span><\/nav>\n            <\/div>\n        \n        <div class=\"page-header__wrapper\">\n            <div class=\"page-header__image-wrapper page-header__image-wrapper--no-image\">\n                            <\/div>\n\n            <div class=\"page-header__content page-header__content--first\">\n                <div class=\"page-header__header\">\n                    \n                                            <h1 class=\"page-header__heading is-style-typestyle-h1\">Security Overview<\/h1>\n                                    <\/div>\n\n                            <\/div>\n                <div class=\"page-header__content page-header__content--last\">\n                                                <div class=\"page-header__description\">\n                        <p>Protecting the confidentiality, integrity and availability of customer data is central to our organisation. Our security practices are built on robust technical controls, clear governance processes and a commitment to continual improvement. This overview explains how we safeguard information throughout its lifecycle and maintain a secure, reliable service.<\/p>\n                    <\/div>\n                \n                \n                            <\/div>\n        <\/div>\n    <\/div>\n\n    <\/header>\n\n    <div class=\"woocommerce-notices-wrapper\"><\/div>\n\n\n<p><strong>Infrastructure &amp; Network Security<\/strong><\/p>\n\n\n\n<p>Our infrastructure uses modern, resilient cloud architecture and strict access controls to protect data.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Environment Segregation:<\/strong> Production and non-production systems\u00a0remain\u00a0separate to reduce risk.\u00a0<\/li>\n\n\n\n<li><strong>Firewalls &amp; Threat Monitoring:<\/strong> Traffic is\u00a0monitored\u00a0continuously, supported by firewalls and automated detection tools to prevent unauthorised access.\u00a0<\/li>\n\n\n\n<li><strong>Regular Patching:<\/strong> Systems and applications are updated\u00a0frequently\u00a0to address vulnerabilities.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>Data Encryption<\/strong><\/p>\n\n\n\n<p>We apply strong encryption standards to safeguard information in transit and at rest.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>In-Transit Encryption:<\/strong> All communications use TLS to secure data during transfer.<\/li>\n\n\n\n<li><strong>At-Rest Encryption:<\/strong> Sensitive data is encrypted using industry-standard algorithms to prevent unauthorised access.<\/li>\n<\/ul>\n\n\n\n<p><strong>Access Control &amp; Identity Management<\/strong><\/p>\n\n\n\n<p>We follow the principle of <strong>least privilege<\/strong>, ensuring access is restricted to what is strictly necessary.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multi-Factor Authentication (MFA)<\/strong>\u00a0for all administrative and internal accounts.\u00a0<\/li>\n\n\n\n<li><strong>Role-Based Access Control (RBAC)\u00a0<\/strong>to align permissions with job responsibilities.\u00a0<\/li>\n\n\n\n<li><strong>Centralised Identity Management<\/strong>\u00a0for consistent oversight and rapid access revocation.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>Secure Development Practices<\/strong><\/p>\n\n\n\n<p>Security is embedded into our development lifecycle to minimise vulnerabilities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Code Reviews &amp; Static Analysis:<\/strong> All code undergoes peer review and automated scanning.<\/li>\n\n\n\n<li><strong>Dependency Monitoring:<\/strong> Third-party libraries are monitored and updated as required to remove known security issues.<\/li>\n\n\n\n<li><strong>Penetration Testing:<\/strong> Independent testing is conducted regularly to validate the security of our platform.<\/li>\n<\/ul>\n\n\n\n<p><strong>Monitoring, Logging &amp; Incident Response<\/strong><\/p>\n\n\n\n<p>Continuous monitoring allows us to detect anomalies quickly and respond effectively.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-Time Monitoring<\/strong> of infrastructure and application activity.<\/li>\n\n\n\n<li><strong>Detailed Logging<\/strong> to support investigation and forensic analysis.<\/li>\n\n\n\n<li><strong>Incident Response Plan<\/strong> outlining coordinated steps to contain, resolve and communicate any security incidents.<\/li>\n<\/ul>\n\n\n\n<p><strong>Business Continuity &amp; Resilience<\/strong><\/p>\n\n\n\n<p>We maintain comprehensive plans to ensure our services remain reliable and available.<\/p>\n\n\n\n<p><strong>Backups:<\/strong> Regular, secure backups of critical data.<\/p>\n\n\n\n<p><strong>Disaster Recovery:<\/strong> Procedures for restoring systems in the event of disruption.<\/p>\n\n\n\n<p><strong>Resilient Architecture<\/strong> designed to withstand component failures without significant service impact.<\/p>\n\n\n\n<p><img decoding=\"async\" alt=\"Shape\" src=\"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b\">&nbsp;<\/p>\n\n\n\n<p><strong>Employee Security &amp; Training\u00a0<\/strong><\/p>\n\n\n\n<p>Security culture is embedded throughout the organisation.\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mandatory Training:<\/strong> Staff complete regular training covering security awareness and UK GDPR.<\/li>\n\n\n\n<li><strong>Background Checks:<\/strong> Pre-employment screening is conducted in line with UK best practice.<\/li>\n\n\n\n<li><strong>Acceptable Use Policies:<\/strong> Employees must follow strict guidelines governing system usage and data handling.<\/li>\n<\/ul>\n\n\n\n<p><strong>Governance &amp; Risk Management<\/strong><\/p>\n\n\n\n<p>Our security governance framework provides clear oversight, responsibility and accountability across the business.<\/p>\n\n\n\n<p><strong>Policies &amp; Procedures:<\/strong> Security and data protection policies are reviewed regularly and made available to all staff to ensure consistent understanding and application.<\/p>\n\n\n\n<p><strong>Vendor Management:<\/strong> Third-party suppliers undergo due diligence to confirm they meet our required security, privacy and UK GDPR standards.<\/p>\n\n\n\n<p><strong>Data Protection &amp; Privacy<\/strong><\/p>\n\n\n\n<p>We comply fully with the <strong>UK GDPR<\/strong> and the <strong>Data Protection Act 2018<\/strong>, ensuring personal data is handled lawfully, fairly and transparently.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Minimisation:<\/strong> Only the information necessary to deliver and improve our services is processed.<\/li>\n\n\n\n<li><strong>Privacy by Design:<\/strong> Security and privacy considerations are integrated into products and features from the earliest stages of development.<\/li>\n\n\n\n<li><strong>Data Subject Rights:<\/strong> We support access, rectification, erasure, portability and restriction rights, as defined under UK GDPR.<\/li>\n<\/ul>\n\n\n\n<p>Further details are set out in our <a href=\"https:\/\/www.millboard.com\/en-us\/en-gb\/trust-centre\/privacy-policy\/\">Privacy Notice<\/a>.<\/p>\n\n\n\n<p><strong>Our Commitment<\/strong><\/p>\n\n\n\n<p>We continuously improve our security posture, informed by evolving threats, regulatory developments and best practice guidance from organisations such as the <strong>ICO<\/strong>. Safeguarding your data remains one of our highest priorities, and we are committed to operating a secure, transparent and trustworthy service.<\/p>\n\n\n\n<p>V1 Jan 2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infrastructure &amp; Network Security Our infrastructure uses modern, resilient cloud architecture and strict access controls to protect data. Data Encryption&hellip;<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":772,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-872","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Millboard Security Overview | Trust Centre<\/title>\n<meta name=\"description\" content=\"Millboard&#039;s security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Overview\" \/>\n<meta property=\"og:description\" content=\"Millboard&#039;s security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"EN-US - Residential\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T18:40:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/\",\"url\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/\",\"name\":\"Millboard Security Overview | Trust Centre\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.millboard.com\\\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b\",\"datePublished\":\"2026-01-08T16:28:34+00:00\",\"dateModified\":\"2026-03-09T18:40:40+00:00\",\"description\":\"Millboard's security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.millboard.com\\\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b\",\"contentUrl\":\"https:\\\/\\\/www.millboard.com\\\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/security-overview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Centre\",\"item\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/trust-centre\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/\",\"name\":\"Millboard\",\"description\":\"Live. Life. Outside.\",\"alternateName\":\"The www.millboard.company\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.millboard.com\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Millboard Security Overview | Trust Centre","description":"Millboard's security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/","og_locale":"en_US","og_type":"article","og_title":"Security Overview","og_description":"Millboard's security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.","og_url":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/","og_site_name":"EN-US - Residential","article_modified_time":"2026-03-09T18:40:40+00:00","og_image":[{"url":"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/","url":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/","name":"Millboard Security Overview | Trust Centre","isPartOf":{"@id":"https:\/\/www.millboard.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/#primaryimage"},"image":{"@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b","datePublished":"2026-01-08T16:28:34+00:00","dateModified":"2026-03-09T18:40:40+00:00","description":"Millboard's security overview outlines the measures we take to protect your data and ensure a safe, secure experience on our website.","breadcrumb":{"@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/#primaryimage","url":"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b","contentUrl":"https:\/\/www.millboard.com\/51c4ef37-ff00-444c-866d-4e37bc7c5c9b"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millboard.com\/en-us\/trust-centre\/security-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millboard.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Trust Centre","item":"https:\/\/www.millboard.com\/en-us\/trust-centre\/"},{"@type":"ListItem","position":3,"name":"Security Overview"}]},{"@type":"WebSite","@id":"https:\/\/www.millboard.com\/en-us\/#website","url":"https:\/\/www.millboard.com\/en-us\/","name":"Millboard","description":"Live. Life. Outside.","alternateName":"The www.millboard.company","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millboard.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/pages\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":1,"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/pages\/872\/revisions"}],"predecessor-version":[{"id":12004,"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/pages\/872\/revisions\/12004"}],"up":[{"embeddable":true,"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/pages\/772"}],"wp:attachment":[{"href":"https:\/\/www.millboard.com\/en-us\/wp-json\/wp\/v2\/media?parent=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}