not familiar with ISO/IEC 27001, but I guess it fits here. Anyway, security measures are a key factor in investing business
The security process include host assessment (on servers), network equipment and security devices for Phase 1.
For Phase 2 it's Penetration Test and Web Assessment Test from within Datacenter, WAN and the internet.
Once assessment is out, a report will be given and hardening to be done.
Upon completion of security hardening there will be a Post-Assessment to close all security issues.
That is wonderful to hear. its good to have security, we would not want all Those Bitcoins stolen by anyone ! ... Except you and your Shadow team of course.
I see your project as a strong group of men, who are concerned not only about their own profits, but also about the long term mutual goals. That's a kind of an image I want to be a part of!
We have both strong men and awesome woman!
We will never know who they are because you are hiding in the background knowing full well that this is a Scam, that you are committing fraud and that you are attempting to steal Bitcoin from people.
#CRIMINALS Doing your part to RUIN Crypto STOP Trying to scam people