We not only harden the applications we make for you, we utilize best practices throughout our organization to ensure both of us remain productive:

All programs strictly sanitize input and output. This blocks exploitation methods such as Cross-Site Scripting and SQL Injection.
The operating system and software used on our computers are kept up to date in order to avoid vulnerabilities.
Incoming mail and files are carefully managed and scanned so unsavory elements like viruses are kept at bay.
Multiple off-site backups of essential data are made to minimize downtime and losses due to catastrophic events.
Encryption and Digital Signatures
Sensitive information is GPG/PGP encrypted and signed. Here's our public key. The integrity of our software can be checked via our software signing key and md5 sums.

Our president is a Principal of the PHP Security Consortium.

( < Search Engine Ranking | Source Code > )