Wood Acres Wood Acres
Wood Acres
Login | Register
Sign up to Volunteer
About Us
Contact Us
Our Location
Our Schools
History of Wood Acres
History of Wood Acres Citizens Association
Architectural Guidelines
Articles of Incorporation
Is this site secure?
Site Search
Board of Directors
Presidents, WACA
Covenants Committee
Block Captains
Directory Info
Homes for Sale/Rent
Message Boards
Rate a Business
Find a Sitter/Caregiver
Lost & Found
Photo Albums
Recipe Book
Downloadable Forms
Montgomery County Services
Report Potholes
Report Street Light Outage
Area Attractions


Is this site secure?

Is this site secure?

Physical Security
·   Data center access limited to Rackspace data center technicians
·   Biometric scanning for controlled data center access
·   Security camera monitoring at all data center locations
·   24x7 onsite staff provides additional protection against unauthorized entry
·   Unmarked facilities to help maintain low profile
·   Physical security audited by an independent firm

System Security

·   System installation using hardened, patched OS
·   System patching configured by Rackspace to provide ongoing protection from exploits
·   Dedicated firewall and VPN services to help block unauthorized system access
·   Data protection with Rackspace managed backup solutions
·   Optional, dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access
·   Distributed Denial of Service (DDoS) mitigation services based on our proprietary Rackspace PrevenTier'" system
·   Risk assessment and security consultation by Rackspace professional services teams
Operational Security — the Rackspace Infrastructure

·   IS017799-based policies and procedures, regularly reviewed as part of our SAS70 Type II audit process
·   All employees trained on documented information security and privacy procedures
·   Access to confidential information restricted to authorized personnel only, according to documented processes
·   Systems access logged and tracked for auditing purposes
·   Secure document-destruction policies for all sensitive information
·   Fully documented change-management procedures
·   Independently audited disaster recovery and business continuity plans in place for Rackspace headquarters and support services

Operational Security — Customer's Application Environment

·   Best practices used in the random generation of initial passwords
·   All passwords encrypted during transmission and while in storage at Rackspace
    Secure media handling and destruction procedures for all customer data
·   Support-ticket history available for review via the MyRackspace® customer portal
·   Help available from Rackspace in configuring system logging to create a system audit trail
·   Rackspace Security Services can provide guidance in developing security processes for compliance programs