PropertyMe takes security extremely seriously.

Not only do we invest in the most advanced technology available for online security, but we also have multiple layers of security built into interactions so our customers are protected at all times.


We use 256-bit SSL (Secure Sockets Layer) encryption which is the same level of encryption used by banks and financial institutions. All customer data is encrypted in transit and at rest.

Layered architecture

We built PropertyMe with a layered architecture so that our core systems aren’t exposed to the internet. This ensures tight control of what services can be reached from within the system.

Two-factor authentication

In addition to a strong password, you can switch on two-factor authentication to add an extra level of security to prevent unauthorised access to your portfolio. PropertyMe requires a unique code generated by the Google Authenticator app on your smartphone which means that, even if your password were to be stolen, an unauthorised user on a new device would not have access to your smartphone to generate the second factor code.

Automatic logout

If you are logged in to PropertyMe and are not actively using the program, it will log you out in case you have left your computer unattended.

Security in the cloud

As your data is stored securely in the cloud, it mitigates the risk of security breaches due to hardware theft, malware and viruses.

Activity logging

PropertyMe records every change in the system, including all material changes to data, along with who made the change and when the change was made. This helps you keep track of what users are working on and makes it easier to detect fraud and theft.

Automatic lockout

To prevent attempts by unauthorised users to guess your password using computerised tools, PropertyMe automatically locks your account for 15 minutes after three failed login attempts.

notifications and alert emails

PropertyMe will send you an email if sensitive changes have been made or when someone tries to access your account from a new computer or mobile device. These messages allow you to quickly identify any security breaches and take action if you don’t recognise the activity.

Granular user management options

Once you’ve granted a team member access, you can select from four access levels to control what each user can see or do in your portfolio, revoke their access, remotely log them out, reset their password, reset their two-factor authentication or expire a device’s authentication altogether.

Read article