Privacy Policy

Who we are

Our website address is: https://officerat.ca.

What Are Credit Card Processing Fees?

OfficeRat.ca charges a Processing Fee for Debit/Credit Card Payments. Credit card processing fees are the fees that a business must pay every time it accepts a credit card payment. There are multiple types of fees associated with each transaction, and fees can vary depending on the type of credit card accepted.

If you purchase from our store you automatically agree to our returns and refund policy when you accept the terms and conditions at checkout.

Website SiteProtection badge

OFFICERAT.CA IS PROTECTED BY BITNINJA STATE-OF-THE-ART SERVER SECURITY.

Site Protection Pro. 24-7 Monitoring. Ninja Response Time <30 min. You Are 100% Protected and can shop here with confidence knowing your data is kept private and transactions are safe.

The Power of BitNinja Server Security: Protecting our Website with Confidence

BitNinja Server Security is the ultimate solution for safeguarding our website and ensuring the stability and performance of our server. With its comprehensive suite of features, BitNinja offers state-of-the-art protection against various types of cyber attacks, malware infections, and server vulnerabilities.

Why we choose BitNinja Server Security?

Proactive and Comprehensive Protection

BitNinja Server Security is an all-in-one platform that offers proactive defense against cyber attacks. By leveraging the power of crowdsourcing, BitNinja gathers information from its global network of protected servers to detect and prevent potential threats before they can harm your website. With BitNinja, you can say goodbye to the headache caused by compromised CMS systems and enjoy peace of mind knowing that your server is protected against various types of cyber attacks.

Powerful Malware Detection and Elimination

One of the key features of BitNinja Server Security is its advanced malware detection and elimination capabilities. By constantly monitoring your incoming and outgoing network traffic, BitNinja can detect and remove malicious traffic, reducing the demand on your server by up to 33%. In addition, BitNinja’s malware scanner module can automatically scan and identify infected files on your server, allowing you to take immediate action to eliminate the threat.

Real-time IP Reputation and Load Reduction

BitNinja’s Defense Network, with its extensive database of over 100 million IP addresses, enables real-time IP reputation monitoring. This means that BitNinja can automatically block bot traffic and known attacker IPs, reducing the load on your server and ensuring optimal performance. With BitNinja, you can unleash the power of crowd intelligence to protect your server and maintain a stable and secure environment.

User-friendly Dashboard and Premium Support

BitNinja provides an intuitive dashboard that allows you to easily monitor and manage your server’s security. With a quick glance, you can access real-time information, detect vulnerabilities, and take immediate action to safeguard your website. Additionally, BitNinja offers exceptional premium support, ensuring that you have access to expert assistance whenever you need it. The BitNinja support team is available 24/7 to address any inquiries or issues you may encounter.

BitNinja Server Security Features

Malware Scanner: Detect and Eliminate Threats

BitNinja’s malware scanner is equipped with advanced detectors that can identify and remove various types of malware and backdoors. With its lightning-fast scanning capabilities, the malware scanner can quickly detect infected files and provide you with the necessary tools to eliminate the threats. By regularly scanning your server, BitNinja ensures that your website remains clean and protected.

Web Application Firewall (WAF): Block Cyber Attacks

BitNinja’s Web Application Firewall (WAF) is designed to monitor, filter, and block incoming and outgoing traffic on the HTTP protocol. With its recommended ruleset, the WAF can effectively prevent cyber attacks such as SQL injections, XSS attacks, and remote code execution. You have the flexibility to adjust the strictness of the WAF based on your specific needs, ensuring that your website is protected without compromising functionality.

Log Analysis: Monitor and Detect Suspicious Activity

BitNinja’s Log Analysis module allows you to monitor your server logs, including Auth log, MySQL, Exim, Apache, NginX, and CPanel. By analyzing these logs, BitNinja can detect and block malicious IPs and brute force attempts in real-time. With Log Analysis, you can stay informed about any suspicious activity and take proactive measures to protect your server.

DDoS Detection and Mitigation: Defend Against DoS Attacks

Denial-of-Service (DoS) attacks can cripple your website and disrupt your business operations. BitNinja’s DDoS detection and mitigation capabilities enable you to defend against such attacks. By monitoring the number of connections on your server, BitNinja can detect and blacklist IPs associated with DoS attacks. This ensures that your server remains accessible to legitimate users while keeping malicious traffic at bay.

Trusted Proxy: Identify True IPs

BitNinja’s Trusted Proxy feature helps you identify the true IP addresses behind an attack and prevent any blocking of legitimate users or exit nodes. With the prevalence of botnets and the use of proxies by website visitors, it is crucial to have an accurate understanding of the source of an attack. BitNinja’s Trusted Proxy ensures that you can effectively distinguish between malicious and legitimate traffic, maintaining the security and accessibility of your website.

Collective Intelligence: Harness the Power of Crowdsourcing

BitNinja’s Defense Network is built upon the concept of crowdsourcing, where the collective intelligence of thousands of BitNinja-protected servers is utilized to enhance server security. By sharing attack data among all BitNinja-protected servers, the Defense Network continuously learns and adapts to new threats, making your server more secure by the second. With BitNinja, you can tap into the power of crowd intelligence to stay one step ahead of cyber attackers.

G Pay, keeping you safe while you pay.

With security built in to protect you before, during and after every payment, using Google Pay is safer than swiping your card or paying with cash. When you pay, Google Pay sends a virtual account number to the merchant instead of your actual card number – so your payment info stays secure.

Payment methods saved to your Google Account are securely stored on Google’s private servers. When you pay online, Google Pay encrypts your data so that your payment stays safe in transit.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Visitor comments may be checked through an automated spam detection service.

Trust Badges