Skip to content

Notices

Platform Security

How we Protect Your Data

At Bsquared Technology Pte Ltd (“B2”), safeguarding your personal and financial data is our top priority. We implement robust measures to ensure the security of your information. Below are the key steps we take to protect your data and how you can enhance your security when using our platform.

How to Use the B2 Platform Safely

  1. Use Strong Authentication
  • Choose a password with at least 12 characters, including letters, numbers, and symbols.
  • Enable 2-factor Authentication (2FA), which is provided by default. For enhanced security, we recommend using app-based 2FA (e.g., Google Authenticator).
  1. Stay Alert to Phishing & Social Engineering
  • B2 will never ask for your password or private information via email or phone.
  • Be cautious of unsolicited emails or messages pretending to be from B2. We will never send anything unsolicited.
  1. Keep Your Login Credentials Private
  • Never share your B2 password or email credentials with anyone.
  • If you encounter login issues, contact our support and complaints team.
  1. Verify You’re on the Official B2 Website
  • Always ensure you are visiting the official site: https://www.btwo.io
  • Our website is secured with SSL/TLS encryption to protect your data from interception.
  1. Watch Out for Fake Emails (Email Spoofing)
  • Verify that emails from B2 originate from an @btwo.io domain.
  • Be cautious with emails requesting sensitive information or containing urgent security alerts.
  1. How B2 Protects Your Data
  • Platform Security
    • ISO 27001 Certified: B2 uses third-party vendors that all adhere to internationally recognised security standards to ensure your data's confidentiality, integrity, and availability.
    • DDoS Protection & Web Application Security: We utilise leading firewalls and anti-DDoS systems to mitigate attacks.
    • Regular Security Testing: We conduct internal and third-party penetration tests to identify vulnerabilities.
    • Bug Bounty Program: the systems we use collaborate with ethical hackers to discover and resolve security issues through our private bug bounty initiative.
    • Vulnerability Management: We prioritise and address security risks based on their severity.
    • Data Encryption: All data is encrypted at rest (AES-256) and in transit (TLS v1.2+).
  • Internal Security Measures
    • Employee Device Security: We employ industry-leading endpoint protection and anti-malware solutions.
    • Network Security: Our network is segmented and monitored for suspicious activity.
    • Access Controls: Employees utilise Single Sign-On (SSO) and Multi-Factor Authentication (MFA) with least-privilege access protocols.
    • Continuous Monitoring: We implement Security Information & Event Management (SIEM) to detect and respond to cyber threats.
    • Backup & Disaster Recovery: We maintain continuous backups across multiple secure locations to ensure quick recovery in case of incidents.
  1. B2's Vulnerability Disclosure Policy

    B2 believes that effective disclosure of security vulnerabilities relies on mutual trust, respect, transparency, and the common good between B2 and security researchers. Together, we enhance the security and privacy of our customers, products, and services.

  2. Security Researchers

    B2 welcomes vulnerability reports from all sources, including independent researchers, industry partners, vendors, customers, and consultants. A security vulnerability is an unintended weakness that could compromise our products and services' integrity, availability, or confidentiality.

  3. Trust, Respect, Transparency, and Common Good

    Trust: We maintain confidentiality in our exchanges with researchers.
    Respect: We acknowledge and appreciate the contributions of researchers in keeping our customers safe.
    Transparency: We collaborate with researchers to validate and remediate reported vulnerabilities.
    Common Good: We investigate and address issues in a manner that protects those potentially affected.
  1. Vulnerability Reporting

    We encourage security researchers to report any suspected vulnerabilities related to B2’s digital assets. The B2 Security team will acknowledge each report, conduct a thorough investigation, and take appropriate actions to resolve it.

 Have Questions or Security Concerns? For any security-related inquiries, please get in touch with us via the Support & Complaints team.

Access liquidity. Bridge markets

Let’s create bolder, smarter markets together.
Get in Touch!

Bridge the Gap
Empowering users with rapid content generation, Thunda transforms ideas into well-articulated, structured, and persuasive text.