Skip to content

Commit e2158a7

Browse files
Update docs/security/operations.md
1 parent 89dd29d commit e2158a7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/security/operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Polygon Labs has security analysts distributed globally to help ensure timely tr
1212

1313
## Incident response
1414

15-
Polygon Labs established an incident response policy and process modeled after industry best practices. We designate key people to act as subject matter experts to join the incident response team as needed depending on the nature of a given cyber security incident. We also leverage third-party agencies to complement our incident response team from top tier security vendors.
15+
Polygon Labs has established an incident response policy and process that is modeled on industry best practices. We designate key people to act as subject matter experts to join the incident response team as needed and depending on the nature of a given cyber security incident. We also use third-party agencies to complement our incident response team from top tier security vendors.
1616

1717
The life cycle of a cyber security incident begins with detection and discovery. At Polygon Labs we leverage a variety of tools such as anti-virus, endpoint detection and response, network intrusion detection, phish screening and anomaly detection to help ensure we identify potential cyber security events early. We also provide our employees and community with mechanisms to proactively report suspicious activity including a ticketing system, instant messaging channels and a dedicated phone number for emergencies.
1818

0 commit comments

Comments
 (0)