We use comprehensive procedures for risk identification and assessment, particularly when it comes to cloud services. All necessary measures to protect the integrity, confidentiality, and availability of data are consistently implemented, including strict access controls to ensure that only authorized individuals have access to sensitive data. Encryption of sensitive data both during transmission and storage, as well as the implementation of physical and virtual security measures, help us protect our data and IT infrastructures. Regular security assessments and vulnerability analyses help us continuously improve the security of our cloud services.