Your Security Matters

Security Policy

Effective Date: 27 February 2026Last Updated: 27 February 2026

1. Introduction

This Security Policy outlines the measures Shadowtek Pty Ltd (ACN 627 829 878) as Trustee for The Dey Family Trust (ABN 32 913 781 386) ("Shadowtek", "we", "us", or "our") takes to protect the confidentiality, integrity, and availability of client data, websites, and digital infrastructure under our management.

We are committed to maintaining the highest security standards across all services we provide, including web development, managed hosting, and ongoing maintenance. This policy applies to all systems, networks, and data we operate on behalf of our clients.

Scope

This policy covers all Shadowtek-managed infrastructure, including shared and dedicated hosting environments, client websites, internal tools, and any third-party services integrated into our operations.

2. Infrastructure Security

Our hosting infrastructure is built on enterprise-grade technology designed to provide a secure, high-performance environment for client websites and applications.

2.1 Server Environment

CloudLinux OS with CageFS account isolation
LiteSpeed Enterprise web server with built-in DDoS mitigation
Imunify360 real-time threat defence and malware scanning
Hardened PHP configurations with per-account resource limits
Automated kernel patching via KernelCare
Encrypted SSD storage with RAID redundancy

2.2 Account Isolation

Each client hosting account operates within an isolated CloudLinux CageFS environment. This ensures that a compromise or resource spike on one account cannot affect other accounts on the same server. Resource limits (CPU, memory, I/O) are enforced per-account to prevent abuse and maintain stable performance.

3. Network Security

3.1 Firewall & Traffic Filtering

  • Cloudflare WAF: All client websites are protected by Cloudflare's Web Application Firewall, filtering malicious traffic including SQL injection, XSS, and bot attacks before they reach the origin server
  • CSF/LFD Firewall: Server-level firewall with Login Failure Daemon for brute-force detection and IP-based blocking
  • Imunify360 Proactive Defence: Behavioural analysis engine that blocks zero-day attacks and suspicious PHP execution in real time

3.2 DDoS Protection

Cloudflare's global network absorbs and mitigates volumetric DDoS attacks at the edge. LiteSpeed's built-in connection throttling provides an additional layer of protection at the server level. We maintain escalation procedures for attacks that exceed standard mitigation thresholds.

3.3 Secure Access Protocols

  • SSH access restricted to key-based authentication only — password-based SSH is disabled
  • SFTP enforced for all file transfers — unencrypted FTP is not available
  • Administrative panels accessible only via HTTPS with valid TLS certificates
  • Non-standard ports used for administrative services where possible

4. Data Protection & Encryption

4.1 Encryption in Transit

All client websites are served over HTTPS using TLS 1.2 or higher. SSL/TLS certificates are provisioned and renewed automatically. We enforce HSTS headers and disable legacy protocols (SSLv3, TLS 1.0, TLS 1.1) across our infrastructure.

4.2 Encryption at Rest

Backup archives are encrypted before transfer to off-site storage. Database credentials and API keys are stored in secure, access-controlled configuration files with appropriate file-system permissions.

4.3 Data Handling

  • Client data is only accessed when necessary for service delivery, troubleshooting, or at the client's explicit request
  • Sensitive credentials shared by clients are stored temporarily and purged once the task is complete
  • We do not access, read, or analyse client databases, emails, or files outside the scope of authorised work

5. Access Control & Authentication

5.1 Administrative Access

  • Root and administrative access is restricted to authorised Shadowtek personnel only
  • Multi-factor authentication (MFA) is enforced for all administrative accounts
  • Administrative sessions are logged and auditable
  • Access privileges follow the principle of least privilege — staff are granted only the access required for their role

5.2 Client Access

  • Clients receive access credentials scoped to their hosting account only
  • cPanel accounts are configured with session timeouts and IP-based access restrictions where requested
  • We strongly recommend clients enable two-factor authentication on WordPress admin and cPanel accounts

5.3 Password Policy

All system-generated passwords meet minimum complexity requirements (12+ characters, mixed case, numbers, and symbols). Clients are encouraged to use password managers and unique credentials for each service.

6. Monitoring & Incident Response

6.1 Continuous Monitoring

  • 24/7 server monitoring for uptime, resource usage, and anomalous behaviour
  • Real-time malware scanning and automatic quarantine via Imunify360
  • Intrusion detection and log analysis with automated alerting
  • Cloudflare analytics for traffic pattern analysis and threat identification

6.2 Incident Response Process

In the event of a security incident, we follow a structured response procedure:

Identify & Contain

Detect the incident, assess scope, and isolate affected systems to prevent further damage

Investigate

Analyse logs, determine root cause, and document the timeline of events

Remediate

Remove the threat, patch vulnerabilities, and restore affected services from clean backups

Notify

Inform affected clients within 24 hours of confirmed incidents, including details of what occurred and remediation steps taken

Review

Conduct a post-incident review to identify improvements and update security controls accordingly

6.3 Notification Obligations

Where a data breach is likely to result in serious harm, we will notify affected individuals and the Office of the Australian Information Commissioner (OAIC) in accordance with the Notifiable Data Breaches (NDB) scheme under the Privacy Act 1988 (Cth).

7. Backup & Disaster Recovery

7.1 Backup Schedule

Daily Backups

Full account backups performed daily and retained for 14 days

Weekly Backups

Weekly snapshots retained for 4 weeks

Monthly Backups

Monthly archives retained for 6 months

Off-Site Storage

All backups are encrypted and replicated to geographically separate off-site storage

7.2 Disaster Recovery

Our disaster recovery procedures are designed to restore services with minimal downtime:

  • Recovery Point Objective (RPO): Maximum 24 hours of data loss
  • Recovery Time Objective (RTO): Services restored within 4 hours for critical systems
  • Failover procedures documented and tested quarterly
  • Contact escalation paths established for critical infrastructure failures

8. Third-Party Security

We carefully evaluate third-party services integrated into our infrastructure. Our due diligence includes:

  • Assessment of the provider's security practices and certifications
  • Review of data processing agreements and privacy policies
  • Preference for providers with SOC 2, ISO 27001, or equivalent certifications
  • Regular review of third-party access and permissions

8.1 Key Third-Party Providers

Cloudflare

DNS, CDN, WAF, and DDoS protection — SOC 2 Type II certified

SMTP2GO

Transactional email delivery — ISO 27001 certified

Domain Registrars

Domain registration and DNS management via ICANN-accredited registrars

Payment Processors

PCI DSS-compliant payment processing for client billing

9. Vulnerability Management

9.1 Software Updates

  • Server operating system and kernel patches applied automatically via KernelCare and scheduled maintenance windows
  • PHP versions kept current — end-of-life versions are proactively migrated
  • WordPress core, plugin, and theme updates monitored and applied as part of managed hosting plans
  • Critical security patches applied within 24 hours of release

9.2 Malware Scanning & Removal

  • Automated daily malware scans across all hosted accounts
  • Real-time file change monitoring for known malware signatures
  • Automatic quarantine of detected threats with client notification
  • Manual malware removal and site hardening included in managed plans

9.3 Security Audits

We conduct periodic security reviews of our infrastructure, including configuration audits, access reviews, and penetration testing of critical systems. Findings are documented and remediated on a risk-priority basis.

10. Employee & Contractor Security

  • All Shadowtek personnel with system access are bound by confidentiality agreements
  • Access is granted on a need-to-know basis and revoked immediately upon role change or departure
  • Contractors and third-party technicians receive time-limited, scoped access only
  • Security awareness and best-practice procedures are reviewed regularly

11. Client Responsibilities

Security is a shared responsibility. While we secure the hosting infrastructure and server environment, clients are responsible for:

  • Maintaining strong, unique passwords for all accounts (WordPress admin, cPanel, email)
  • Enabling two-factor authentication where available
  • Keeping WordPress core, plugins, and themes updated (or opting into our managed update service)
  • Not installing nulled, pirated, or untrusted plugins and themes
  • Reporting suspected security incidents to us promptly
  • Safeguarding credentials and not sharing login details via insecure channels
Important

Shadowtek is not liable for security breaches resulting from client-installed software, weak credentials, or actions taken outside our managed scope. Refer to our Terms of Service for full details on shared responsibility.

12. Vulnerability Disclosure

Shadowtek welcomes responsible security research and encourages the reporting of potential vulnerabilities so they can be assessed and addressed appropriately.

12.1 Scope

This disclosure policy applies to:

  • shadowtek.com.au
  • Systems and infrastructure operated directly by Shadowtek
  • Client environments hosted and managed by Shadowtek (where applicable to infrastructure-level security)

This policy does not grant authorisation to test third-party systems, vendors, or client applications outside Shadowtek-managed infrastructure. If you are unsure whether a system is in scope, please contact us before conducting any testing.

12.2 How to Report a Vulnerability

Report To

If encryption is required, please request our public key in your initial email.

To help us triage efficiently, include:

  • A clear description of the issue
  • Steps to reproduce
  • Affected URL(s) or IP(s)
  • Screenshots or proof-of-concept (if available)
  • Your contact information

12.3 Responsible Disclosure Guidelines

We ask that researchers:

  • Avoid privacy violations, data destruction, or service disruption
  • Do not exploit vulnerabilities beyond what is necessary to demonstrate impact
  • Do not access, modify, or delete data belonging to others
  • Do not conduct denial-of-service testing
  • Provide us reasonable time to investigate and remediate before public disclosure

12.4 Safe Harbour

Shadowtek will not pursue legal action against researchers who:

  • Act in good faith
  • Comply with this policy
  • Avoid harm to users, clients, and infrastructure
  • Do not exploit vulnerabilities for personal gain

Activities outside these guidelines may be considered unauthorised.

12.5 What You Can Expect From Us

  • Acknowledgment of your report within a reasonable timeframe
  • Investigation and validation of legitimate findings
  • Remediation where appropriate
  • Communication where clarification is needed

Shadowtek does not currently operate a public bug bounty program. At our discretion, we may acknowledge researchers who responsibly report valid vulnerabilities.

12.6 Out of Scope

The following are generally out of scope unless demonstrably impactful:

  • Automated scanner reports without proof of exploitability
  • Clickjacking on non-sensitive pages
  • Missing security headers without demonstrated risk
  • Rate limiting or brute force claims without proof of impact
  • Issues in third-party software where no misconfiguration exists

13. Changes to This Policy

We may update this Security Policy from time to time to reflect improvements in our security practices, changes to our infrastructure, or updates to legal and regulatory requirements.

  • The "Last Updated" date at the top of this Policy will be revised with each change
  • Material changes will be communicated via email to active clients
  • Continued use of our services after changes become effective constitutes acceptance of the updated Policy
  • We recommend reviewing this Policy periodically to stay informed

14. Contact Information

For questions, concerns, or to report a security issue, please contact us:

Shadowtek Pty Ltd
  • ACN: 627 829 878
  • Email: [email protected]
  • Security Issues: [email protected] (Subject: Security Report)
  • Postal Address: PO Box 6, Warwick, QLD 4370, Australia
  • Website: https://www.shadowtek.com.au/

Acknowledgment: By using our website or services, you acknowledge that you have read, understood, and agree to the security measures and shared responsibilities outlined in this Security Policy.