In a digitalized world we know the importance of online data management.
Every day we look for the best technologies, and we do our best to apply the most suitable solutions for the security of our customers’ information.
One of the most critical aspects with online accounts is the management of login passwords which – often – are not kept with due care by users. There are many bad guys who can’t wait to take advantage of yours distraction!
Any of these common actions could put you at risk of having your password stolen:
- Using the same password on more than one site
- Downloading software from the Internet
- Clicking on links in email messages
We count on our users to pay attention, but sometimes it’s not that simple, so we apply various solutions to protect you.
Here are some of them that we want to share.
2-Factor Authentication (2FA)
2FA can keep bad guys out, even if they have your password. With 2FA we add and extra level of protection. Each time you login with your id and password we will generate a unique (one-time) verification code that you will receive in your email inbox. You may disable this feature from your account settings (not recommended).
HTTPS (Hypertext Transfer Protocol Secure) is what we force you to use when you access our services. Basically, HTTPS can create a secure SSL connection through an insecure network (Internet). SSL (Secure Sockets Layer) is a protocol that provides secure communications on the Internet. In this context TLS is the new industry standard based on Secure Sockets Layer (SSL) and we use TLS 1.2. We obtained a A+ Overall Rating (which is the maximum).
To protect your account from people trying to log in, users that enter a wrong password too many times will be locked. This is something we manage on our systems and there is nothing you have to do.
The passwords that you store into our database are encrypted. This applies to any password like your login password, your email password, etc. Nobody, including our employees, can read your passwords. When the password needs to be used the server uses a decryption key that is changed on a regular basis.