I love working with you!!!! Your team has been very professional, courteous, and prompt in helping me handle the workload of my firm. Resolving many special and complex tasks that are beneficial to my firm.
Learning about new clients and the way they have their accounting can be tricky but Team Infinity Globus has been a quick learner and has taken over tasks entirely which has reduced our training time and workload. Utilizing Infinity Globus has free our accounting staff of 40 hours of data to focus more on client relationships and development which has been a win-win for our clients & us.
Thank you for taking on tax & bookkeeping service for my company. I know it was a new venture but is so crucial to Tax-Bookkeeping company like mine that it is a surprise at how professional you complete the task that it is not listed as one of our offerings, but am glad to have this as an arsenal of outsourcing through Infinity Globus.
We have been working with Infinity Globus. They have good knowledge of software, and the communication between our teams on workflow planning and completion has been very professional. We have been very satisfied with the service from Infinity.
I have been working with Infinity Globus. It is, therefore, a huge compliment to the team at Infinity that they are quickly becoming my ‘go-to’ provider. The service turns around prompt, accurate they have the desire to go the extra mile. I am delighted with the service I receive.
Have any Questions?
Get In Touch
We are aware that whenever a company opts for services like accounting, bookkeeping, payroll or taxation a lot of sensitive data requires to be shared. We are extremely sensitive to the security and confidentiality of client data.
We are also ISO 27001-2013 certified for the most standard Quality Measures for Information Security.
Certified GDPR Compliance
We follow strict protocols to implement physical as well as IT related aspects of data security.
- Our premises are covered with closed circuit cameras to monitor and secure our work place.
- We have implemented an access control system at the entrance of our workplace to allow only controlled entry into the production areas.
- The access to the server room is restricted and no one except the IT team is allowed to enter. This access too is authenticated by access card only.
- Our workstations do not have CD R/W drives.
- The USB ports at the workstations are disabled.
- Document storage area is well protected.
- Every workstation is installed with anti-virus software which checks for updates daily. A quick scan is done on a daily basis. We have boot scan and full scan scheduled on weekly and monthly basis respectively.
- The anti-malware software on all computers does a quick scan twice a day.
- The access to company’s network is protected by default windows firewall software.
- All the computers are password protected. Every user has his/her password which is compulsorily changed every 42 days.
- All users have restricted access to client information. Only authorized users have access to the restrictive information of the clients that they are working for.
- We have different account management policies like deactivation of accounts after separation of affiliation. The account access requirements are reviewed regularly for changes.
- The session controls on all the workstations and servers are implemented for added security. The server is configured to LOCK after 5 minutes of unattended time. It requires re-authentication to unlock again. All computers are configured to LOCK after 10 minutes of unattended time. They would require re-authentication to unlock again.
- Various backup operations are scheduled to prevent the loss of data. We have a previous version backup scheduled twice a day. The differential backup is scheduled weekly whereas the Full backup is scheduled monthly.
- The use of personal email accounts is not allowed to the users. The access to various Internet sites is also restricted and controlled.
- We are moving towards a paperless environment which serves the purpose of being eco-friendly as well as ensuring security of data.
- We also have IP authentication to restrict outsider access to confidential information within the office.