The data is hosted on servers that are behind firewalls and are not accessible directly to anyone outside. The servers are secured and only specific ports are opened depending on the services running on the servers. The login to the servers is only via secure ssh and are restricted to only admins. The database on the servers is accessible only via authentication.