Security Measures

Melody Jaimon • January 6, 2023

The following security measures are in place.

Network and Data Communication

Remote access necessitates a VPN connection as well as two-factor authentication.

Antivirus, Malware Protection and Path Management

Automated vulnerability scans are performed on a regular basis to detect web application vulnerabilities.

Backup and Restore

Static resources (images, files, scripts, etc.) in Website Builder are automatically backed up on a daily basis using AWS AMI. Furthermore, data is replicated to a different AWS data centre.

Monitoring and Alerts

We use a number of automated monitoring tools to detect anomalies and misuse.

Access Control

A central firewall protects all data communication networks with external access. Functionality and usage are separated in networks.


When accessing critical systems, networks, firewalls, SSL certificates, and virtual private networks (VPN) are used.


SSL encryption is used for all TCP outbound communication.


Website Builder's servers are protected against malware and intrusion detection systems.


AWS conducted central patch management on a regular basis for security-related updates to ensure that known security flaws cannot be exploited to gain unauthorised access to systems and data.


Website Builder makes use of AWS automated backup features, which enable it to restore the database state and data to any point in time within the previous 14 days. Furthermore, Website Builder uses the RDS API to perform periodic database snapshots.


Website Builder will not provide user account information unless proper verification of the account owner's identity is established.

Delete and Destroy

Customer Data will be kept only as long as there is an active agreement between Website Builder and the partner or customer, and as long as it serves the purposes for which the data was collected. Unless there is a legal or contractual obligation to retain data for an extended period of time, the customer's data will be deleted or at the very least personal data will be removed upon the expiration of an agreement with the customer.

Physical Security

The "need to know" principle governs access to Website Builder's systems and applications. Admin access necessitates the use of multi-factor authentication as well as passwords that adhere to the Website Builder password policy.


The platform's password policy is enforced for all users (account owners, team members, and customers). The password has been fully encrypted and hashed.


The activities of Website Builder are based on AWS cloud computing services.

See How Our Agency Can Drive Massive Amounts of Traffic to Your Website

Website Design designed for your audience and to be found on Google Searches
SEO - unlock relevant and increased SEO traffic. 

Paid Media - effective paid strategies with a clear ROI.

Get Started

Love My Online Marketing has 10+ Years of working alongside businesses and helping them grow. Discuss your options for online success from website Design and Development through to Google Marketing.

Get in Touch

Do you want more traffic and business leads?

Love My Online Marketing is determined to make a business grow. Our only question is, will it be yours?

Let's Chat
A group of people are working on a project on a whiteboard.
By Melody Jaimon July 22, 2025
Learn UX design principles, research methods, and UI best practices that shape intuitive, user-friendly websites. Read the full guide for actionable insights.
A group of people are looking at a computer screen in an office.
By Melody Jaimon July 15, 2025
MVP or prototype? Understand their unique roles and how to choose the right one for your startup's early-stage success. Read the full breakdown.
A computer is sitting on a desk with a website on the screen.
By Melody Jaimon July 10, 2025
A website is still essential in 2025 for control, trust, and growth. Learn why your business needs one and how it gives you the edge. Read more.
A laptop computer is open to a screen that says traffic.
By Melody Jaimon July 10, 2025
Use a free website traffic checker to track your site’s performance, compare competitors, and uncover SEO insights. Read more for top tools and expert tips.
A group of people are sitting at a table in front of a window.
By Melody Jaimon July 10, 2025
Starting a business in Australia? Learn how to register, plan, brand, and grow your startup with practical advice and insights. Read the full guide.
A woman is recording a video with a camera while wearing headphones.
July 10, 2025
Video agencies bring brands to life with emotion, narrative, and motion. Learn how they're reshaping marketing for the digital age. Read more here.
A laptop with a red envelope with a padlock on it.
By Melody Jaimon July 9, 2025
Email hacking is a growing risk. Learn how accounts get hacked, spot the signs, and boost your cybersecurity. Read the full guide to stay protected.
Two flags are flying in front of a building
By Melody Jaimon July 2, 2025
More Australian websites now feature Acknowledgement of Country. Learn why it matters, how to write one respectfully, and where to include it on your site.
A person is holding a cell phone in front of a laptop using Gmail as part of a Google Workspace CRM
By Melody Jaimon June 20, 2025
Looking for a simple CRM alternative? Learn how to use Google Workspace as a CRM system for your small business. Manage enquiries, share inboxes, assign tasks, and stay organised—without extra software.
a man touching an email icon with his index finger
By Melody Jaimon June 20, 2025
Google MX records direct Google and other search engines to your mail server. Without these records, mail from your domain will often be sent to the spam folder. Read more about Google MX records, including how to set them up.