Secure File Share

Why Secure File Share? It’s true. ICFiles is more swift than most other document sharing systems, and more secure than a cabinet with a lock on it. In sum, it’s like having a lock on every client file and it takes a trillion years to hack the encryption.

Here’s how we handle safety:

Secure File Share

  • ICFiles.com is hosted in a SOC 2 Type II data center.
  • At the core is a SSL DigiCert that supports 4096-bit, SHA2 encryption.
  • All data are stored in an encrypted state on the server using 256-bit AES encryption.
  • ICFiles regularly undergoes security & vulnerability scanning.
  • Our servers are real time virus protected, intrusion protected, and backed up while encrypted.
  • Not Vulnerable to Cryptolocker Ransomware.
  • ICFiles is strong password.
  • All account passwords are encrypted with a one-way encryption. No one knows your password except you.
  • Audit Trails for past and present documents.
  • User and Admin level permissions.
  • File size upload limit per file is 4 GBs – 10 GBs or more with ICF Express
  • Compliance Reports on request with NDA (Non Disclosure Agreement).
  • No free access, all users are identified and verified.

Get Started

Making it Make Sense for Everyone

SAS 70 is now SSAE 16

In April 2010, the AICPA (American Institute of Certified Public Accountants) announced the end of SAS 70 and replacement of SAS 70 with a standard based on international standards in mind, as well as AICPA standards, the “Statement on Standards for Attestation Engagements” or SSAE 16.

So an SSAE 16 audit can now report in three standards and two types: SOC 1, 2 and 3, Type I and Type II

Further, SSAE 16 report is sometimes referred to as SOC 1.

Why is SOC 2 better for your data than SOC 1?

  1. SOC 1 (SSAE 16) reports on an organization’s financial reports standards.
  2. SOC 2 report was designed for technology companies that like to keep their security private and includes auditor testing and results and requires a signed NDA (Non-Disclosure Agreement) to view the results.
  3. SOC 3 is for public use and provides a system description and the auditor’s opinion and is designed more for marketing.

Intended Scope:

  • SOC 1: Internal Controls over Financial Reporting (ICFR).
  • SOC 2: Controls at a service organization that are relevant to security, availability, processing integrity, confidentiality, or privacy.

Type I report focuses on the system design of an organization’s controls.
Type II report focuses on the operating effectiveness of an organization’s controls and includes all of Type I (the auditor verifies that the reported controls work as stated).

The importance of a SOC 2 Type II Data Center

A SOC 2 Data Center can provide you with a feeling of trust knowing that your data is protected by a facility, a group of employees and a company that adheres to a standard of excellence.

Trust Services Principles of a SOC 2 facility

  • Security
    The system is protected against unauthorized access (both physical and logical).
  • Availability
    The system is available for operation and use as committed or agreed.
  • Processing Integrity
    System processing is complete, accurate, timely, and authorized.
  • The Confidentiality
    Information designated as confidential is protected as committed or agree.
  • The Privacy of Personal Information
    The service organization collects, uses, retains, discloses, and disposes of for user entities.
  • Compliance Reports on request with NDA (Non Disclosure Agreement).

Get Started

Separate Yourself

What ICFiles offers that others don’t

In addition to full customization to fit your every need at every price, we offer:

  • IBM SOC 2 Type II data center.
  • Unlimited client/user accounts.
  • Unlimited   number of Administrator accounts at 5 GBs.
  • Super Admin level.
  • SS Admin level.
  • No charges for bandwidth.
  • Customer branding to match your website look and feel.
  • Custom Website sign on box comes with set up.
  • Free U.S. customer support.

 

Get Started

Technology Partners