We provide the IP address-based access to our registered users. Moreover, firewalls, anti-spam, and anti-virus tools have been configured to catch and get alert of any intrusion. We have tested our software against OWASP top 10 vulnerability assessment and have taken care of any vulnerability in our application as well.