Here at Tute we pride ourselves in keeping your data safe using industry-leading solutions to encrypt and protect your data from being compromised.
Vulnerability “Heartbleed”
In recent news, a new Internet-wide vulnerability called “Heartbleed” was discovered that affects the OpenSSL framework, which is used by many websites to privately send data to and from a server on the Internet. As soon as we verified this vulnerability, The Tute team immediately responded and had a fix in place on Tuesday, April 8th, 2014.
Our #1 Priority
Tute Genomics takes very seriously the responsibility we have, and the trust that has been placed in us, to protect our users sensitive information. The Tute platform was created to offer both the convenience and performance of cloud computing, while keeping data safe and secure. While security is an ongoing process, here are a few security practices we observe:
- 256-bit encryption
- Cloud-computing & API access best practices
- Constant updates to ensure latest patches to all services and software
- No payment information is stored by our systems
What can we do to stay secure?
Even though the Tute team has your back, there are a couple things you can do to keep yourself secure while using the Tute software or other services on the web.
- difficult passwords
Most compromised passwords are the result of simple, easy to guess, words or phrases. Try to avoid using common dictionary terms or personally identifiable information. A unique pass phrase or sentence can be both easy to remember yet very hard to hack. By using a difficult password, you’re securing yourself from unwanted breaches in your accounts. Keep them secure by using upper-case & lower-case letters, digits, and special characters like ! and *. Remember, the longer the better. And of course, do not use the same password for multiple systems. - update passwords
Even the best password can be cracked if a hacker has enough time. Protect yourself by updating your passwords at least once a year, or especially after a security issue was found (such as the “Heartbleed” vulnerability)
Questions? Concerns?
Email us at [email protected]