Mesh Payments Is SOC 2 Certified By Sarah Murphy Information security is increasingly important in a digitized world, and the risk of data breaches and fraud shouldn’t get in the way of managing your company’s money. At Mesh Payments, we take protecting our customers’ information seriously. We undergo rigorous internal and external audits to ensure that requirements are being met to keep our platform and your information safe. We work hard to ensure you have total peace of mind that your company’s data is completely secure. So, we are proud to announce that Mesh Payments is certified SOC 2 compliant by KPMG. We continue to monitor compliance using Drata. What is SOC 2? SOC 2 is a technical audit, developed by the American Institute of Certified Public Accountants’ (AICPA) – the national professional organization of CPAs. It sets guidelines for how companies — specifically companies that store user data on the cloud — should manage customer information. The audit procedure was created to help businesses ensure they are “handling customer data securely and in a manner that protects your organization and the privacy of your customers.” The audit focuses on controls companies put in place in regards to five Trust Services Criteria (TSC): Security Availability Processing integrity Confidentiality Privacy By reaching and maintaining SOC 2 compliance, a company is deemed to handle their customers’ data responsibly. Additionally, Mesh received a SOC 2 Type II report, which is a more robust audit that examines a business’s security measures over time. What Does that Mean for Mesh Payments Customers? A SOC 2 report is the highest industry standard to vet that a business’s security policies and practices have been audited thoroughly. It ensures that we follow and enforce a framework of best practices required to keep all data in our software safe and secure and that we implement and enforce continuous ongoing measures to prevent any possible data breaches to the very best of our ability. Mesh users can rest assured that we have demonstrated evidence of implementing best security practices in our platform, and will continue to rigorously protect all customer’s data in the cloud at the highest industry standard. User’s interested in finding out more about our SOC 2 and privacy compliance measures can review our security information. Additional detailed information about our SOC 2 compliance is available upon request. Get the latest blogs from Mesh by subscribing to our newsletter Manage Your Payments With Full Control & Visibility Get Started Sarah Murphy Sarah is a Content Manager for Mesh Payments. Before working in marketing, she completed her Master of Journalism degree at Toronto Metropolitan University (f.k.a. Ryerson University) and worked as an arts journalist in Toronto. She was a content writer for tech companies in the retail and workforce management sectors before joining Mesh in 2022.
5 Best Practices for Faster Reconciliation Follow these best practices for quick reconciliation to eliminate time-consuming manual work and inefficient processes. Read the Article
4 Essential Steps to Boost Visibility for Your Company Spend Discover ways to increase visibility for your company spend by overcoming common challenges like data standardization and manual work. Read the Article
4 Best Practices for Spend Management at Global Enterprises Read about some of the key practices that can help organizations manage global spend effectively — wherever they operate. Read the Article
Continuous Accounting: Just a Trend or the Future of Finance? Learn how continuous accounting can help you keep your financial data up to date and accurate, so you don't have to dread the month-end close process. Read the Article
3 Best Audit Management Tools for a Streamlined Audit Process Discover the top audit management solutions to help you increase efficiency and streamline the audit process. Find details on features, pricing, and more. Read the Article
Operational Treasury Risks: Overview, Types and Management Strategies Learn about the different types of operational risks and how to manage them effectively. Read the Article