Security and Reliability Safeguards
Last updated: March 2026
At BillingNow we know that our customers rely on us as an important part of their business processes and record keeping. We take our responsibilities to our customers seriously, and the security and reliability of the software, systems and data that make up the BillingNow application are our top priority.
Security
Encryption in Transit
All communications between your browser and BillingNow are encrypted using HTTPS with TLS. The padlock icon in your browser confirms you're connected to the real BillingNow and that your data is protected during transmission.
Data Encryption
Sensitive information such as payment provider credentials is encrypted using AES-256-GCM encryption before being stored. This ensures that even in the unlikely event of a data breach, your sensitive data remains protected.
Secure Authentication
BillingNow uses industry-standard OAuth 2.0 authentication with Google and Apple sign-in options. Sessions are securely managed with automatic expiration, and all authentication tokens are cryptographically signed.
Payment Security
Payment links feature secure, time-limited tokens that automatically expire. All webhook communications from payment providers are verified using cryptographic signatures to prevent tampering.
Secure Development
Our development team follows OWASP security guidelines and applies the principle of least privilege throughout the application. We use automated security monitoring to detect and respond to potential threats.
Reliability
Global Infrastructure
BillingNow is deployed on a global edge network, providing automatic DDoS protection, low-latency access worldwide, and automatic failover to ensure your invoicing never goes down.
Database Redundancy
Your data is stored in a managed PostgreSQL database with automatic point-in-time backups. Data is replicated to ensure high availability and quick recovery in case of any infrastructure issues.
Security Contact
If you have security concerns, questions, or if you're a security researcher who has discovered a vulnerability, please contact us directly at:
info@cappsule.io