Security
The protection of client information and information systems from unauthorized access, use, disclosure, modification, or destruction is of paramount importance to us.
We have control systems in place to ensure that the core principles of information security are upheld, namely, confidentiality, integrity and availability.
Our system of procedural controls includes signed confidentiality statements from our employees, separation of duties, a corporate security policy, a complex password policy and dual authentication via token identification and passwords for access to our online accounting portal iADEPTA.
We also have in place various technical controls where software and data are used to monitor and control access to information and computing systems. These include the use of passwords, leading edge firewalls, a network intrusion detection system, anti-virus and anti-spyware software, access control lists, encryption of data transmitted off-site and the principle of “least privilege”.
Additionally, we have in place a number of physical controls in order to monitor and control the environment of our work place and information technology facilities. These include security protected access to our work place, visitor control, climate control, smoke and fire detection systems, data back-up controls, and separation of the network from work function areas.
We have control systems in place to ensure that the core principles of information security are upheld, namely, confidentiality, integrity and availability.
Our system of procedural controls includes signed confidentiality statements from our employees, separation of duties, a corporate security policy, a complex password policy and dual authentication via token identification and passwords for access to our online accounting portal iADEPTA.
We also have in place various technical controls where software and data are used to monitor and control access to information and computing systems. These include the use of passwords, leading edge firewalls, a network intrusion detection system, anti-virus and anti-spyware software, access control lists, encryption of data transmitted off-site and the principle of “least privilege”.
Additionally, we have in place a number of physical controls in order to monitor and control the environment of our work place and information technology facilities. These include security protected access to our work place, visitor control, climate control, smoke and fire detection systems, data back-up controls, and separation of the network from work function areas.
Customer Testimonials

Ronald - Sonrons Ltd
Accounting experts of Adepta have been providing us with high quality accounting services during these years of cooperation, on top of that they have been giving us valuable financial guidance. We definitely recommend Adepta, if you value precision, service and quality.

Ramona - Dekonoma Ltd
I always had this association that accountants are especially cold and boring people, but since I have been working with Baiba my thoughts have changed. Baiba is positive, does not talk around, she is calm and only peace and professionalism is radiating from her. She helps me concentrate only on my creative work and she always finds the best solution at an any given moment.