get started
What is ICFiles?

Speed Test

Call Us (877)251-3273

 
 

Request a Demo





Industry

 

Danaoverall

“Without a doubt, some of the best money I have ever spent in my practice is the yearly fee to your company.  Not only from a cost cost/benefit standpoint, your service is impeccable.  I have given my building mate, a law practice, your contact information.” 

Dana C Overall CPA. PCS.

Believe in Security? We Do.

As a matter of fact that is all we think about – Secure File Share

These days, when it comes to safe, secure file transfer, you can’t be too careful. That’s why we created ICFiles, an encrypted communication system aka Soc 2 secure file sharing or secure file share desktop app. Our advanced technology delivers unrivaled end-to-end security covering all the access points to and from any virtual or physical location. Simply put, ICFiles provides customers with the confidence that can’t be obtained using email, FTP or any other avenues used to share files.

But there’s more – Secure File Sharing

Even better, we believe in server thinning and free bandwidth, which means content delivery is decidedly faster.

Secure File Sharing Secure File TransferICFiles are stored on an SOC 2 Type II, ISO 27001, 27017, 27018, CSA, HIPAA and CJIS compliant data center. This allows you to file share with your client’s  with no worry’s. However, what makes this communication airtight is account passwords are designed with a one-way encryption. One knows your password and usernames are unique.

Something far more important – CPA Secure File Transfer

There is nothing more important to us than the safe, secure file transfer of your documents. This is what drives us.

SOC2 at an affordable price!

 

History of Encryption

 

For CPAs

CPA Secure File Sharing

Time to Discover Your Italian Roots Accounting as we know it was born during the Italian renaissance.  Seemingly mundane, the birth of double entry bookkeeping was actually a revolutionary event in the financial world. This new method of bookkeeping allowed merchants and bankers to better determine their profits and elevated commerce to new heights…

Read More

For Lawyers

Lawyer Secure File Share

Without Secure Encryption, Heads Will Roll After Mary, Queen of Scots, stepped down from her throne in Scotland in 1567, the Babington Plot was hatched by her cousin, Queen Elizabeth. This plot would frame Mary for conspiring to kill Protestant Queen Elizabeth and reclaim England’s throne under the guise of making England a Catholic nation once again…

Read More

For Investment Advisors

Investment Advisors Secure File Share

It’s No Secret That Security is Job #1 Hundreds, if not thousands of orders of secret societies have existed over time. Many Europeans participated in these societies during the 1700s, from skilled workers to nobility. This prompted European governments and the Catholic Church to act because they looked down upon secret societies…

Read More

For EA / Tax Professionals

EA / Tax Professionals Secure File Share

It’s a Battle Out There America unofficially became involved in World War II when the Japanese signaled their imperial march by attacking American military bases in Guam, the Philippines and Pearl Harbor on December 7, 1941.  Meanwhile, France succumbed to the Nazi blitzkrieg invasion and Britain weathered Hitler’s nightly bombing campaign…

Read More

For Architects / Engineers

Architects / Engineers Secure File Share

In Business, it’s a Battlefield Leading up to World War II, Poles found their country increasingly insecure. Between Germany and Russia, its potential foes, Poland’s intelligence service focused on breaking Germany’s radio broadcasts to assess possible threats. However, Poland needed to figure out how to decipher the encrypted radio…

Read More

For Construction / General Contractors

Construction / General Contractors Secure File Share

Lay a Safe, Secure Foundation In 2003, Steven Klinsky and Maureen Sherry, seasoned stock market whizzes, purchased an apartment for well above $8 million dollars. Located in the moneyed section of Manhattan, between 50th Street and 60th Street, their newly purchased apartment was formerly owned by E.F. Hutton and Marjorie Merriweather Post…

Read More

For Government Agencies

Government Agencies Secure File Share

Learn How to Safeguard Your Documents Like the Infamous In 1919, at only 22 years old, Al Capone came to Chicago to help Johnny Torrio run his bootlegging operation.  Capone was originally only called in to help deal with the competition, but in 1925 Torrio fled the city allowing Capone to take over. The Hawthorne Inn in Cicero, with its bulletproof shutters

Read More

For Medical Professionals

Medical Professionals Secure File Share

Still Unbreakable After All These Years 500 years later, the Voynich Manuscript is one of Europe’s most puzzling encrypted documents. Penned in the late 1400s or the early 1500s, it contains encrypted passages and unexplained sketches. Named in honor of Wilfrid M. Voynich’s when he acquired it in 1912, it’s been referred to as a written historical enigma…

Read More

For Everyone

Everyone Secure File Share

We’ve Come a Long Way –  Advances in cryptography make today’s Secure File Share nearly impossible to access by outsiders. But let’s look at where we started. Cryptography in the form of codes, ciphers, invisible ink, and hidden messages were used as a form of data encryption by both sides during the Revolutionary war, including many Loyalists who spied for Britain…

Read More

For CPAs

CPA Secure File Sharing

Time to Discover Your Italian Roots Accounting as we know it was born during the Italian renaissance.  Seemingly mundane, the birth of double entry bookkeeping was actually a revolutionary event in the financial world. This new method of bookkeeping allowed merchants and bankers to better determine their profits and elevated commerce to new heights…

Read More

previous next
 
 

Client Login

Don't have an account? Sign up Below

Newsletter

Stay in touch with the latest news

We send out periodic email newsletters. We cover news in the industry.

Twitter Feed

Real News from Real People

Indeed, the Justice Department failed to offer several items when asked whether to take advantage of the resignation of the authorities.

New Ransomware Attack Is Hitting Airlines, Banks and Utilities across Europe #security via @verge bit.ly/2tjUzmS pic.twitter.com/24Jp17KOae

 
 
secure file transfer