MODERN PROPETY MANAGEMENT WITH A FOCUS ON 21ST CENTURY RECORD KEEPING AND DATA SECURITY
As part of the onboarding process all new Boomtown property owner are given secure access to their online portal where reviewing financial records is a breeze.
All back-up documentation (think invoices and receipts) is encrypted and housed on a platform, separate from our property management system, to diversify risk – yet still available online 24/7.
Boomtown property management systems are secured through two-factor authentication using best-of-breed technology, and only accessed by Boomtown employees.
Boomtown uses software to identify and immediately reverse malware and ransomware encryption in real-time. As a final line of defense Boomtown also uses software to backup our data and restore all company files in the event of a catastrophic data loss.
RECORD KEEPING
More than just financials, effective property management involves collecting, housing, safeguarding and easily accessing all the information needed to administrate your rental property.
Invoices and Receipts. All invoices and receipts are scanned and saved as a PDF file as back-up documentation when needed. Unlike some of our competitors, Boomtown understands this importance of financial back-up documentation and we are happy to help you organize and store this data.
Move-in / Move-out Videos. Security deposit administration and adjudication is probably the most difficult and contentious parts of property management – we’re ready for it! In addition to detailed inspections, we take HD videos (about 30 mins on average) to document the condition of each property before and after a tenancy. Recording the condition of each property is very important when administrating the security deposit so we’ve adopted video to fulfill this requirement of record keeping.
Preferred Vendors / Miscellaneous Idiosyncrasies. A part of the on-boarding process you will complete an online questionnaire to make sure we capture all of the miscellaneous information and special instructions needed to manage your property well. Do you have preferred vendors? No sweat, we’ll capture that info and update our database to reflect your preferences. Does your home have peculiarities or special instructions for the new tenants? We’ll record all of these items as part of our regular process to make sure nothing falls between the cracks.
DATA SECURITY
At Boomtown we employ a mix of processes and software to prevent, detect, and immediately reverse the effects of malware / ransomware on Boomtown data.
Property Management System. Sensitive data in our property management system is encrypted, access is limited to Boomtown employees only, and two-factor authentication is required every 30 days or anytime a new device is used to sign-in to an existing account.
End Point Security. All smart phones and computers with access to Boomtown data are protected using best-of-breed security software to provide real-time monitoring for viruses, malware, spyware and ransomware.
Boomtown File Encryption. Data “at rest” (stored online long-term) is encrypted using 256-bit advanced encryption standard. When files are uploaded to our platform a secure tunnel protected by 128-bit advanced encryption standard is opened using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocols. Finally, access to these files is limited to Boomtown employees and protected using two-factor authentication. Boomtown property owners are given access to these files on a “read only” basis to prevent corruption.
CRITICAL DATA BACKUP
At Boomtown we subscribe to the 3-2-1 Rule. Three copies of data, utilizing two different media formats, and house one of the copies offsite.
Unfortunately, with malware and ransomware attacks on the rise it’s important for all business to take a thoughtful approach to a recovery plan if company data is corrupted or encrypted for ransom. We clearly understand this risk to our business as well as any data we have committed to make available for your records. With this in mind we’ve adopted big business best practices to ensure our continuity of operations is never disrupted due to malicious or criminal activity.