Encryption is Paramount
Encrypted All the Way
Your clients files and folders are broken up into blocks and encrypted before they leave your PC, Mac or Server, then they are sent across a secure tunnel to our servers, then they are stored in this encrypted state in our own secure data centre.
Secure User Accounts
Each user gets their own individual account and password, and corresponding unique encryption key. This encryption key ensures that while your clients data is securely stored at our data centre, only you have access to it. Even our systems administrators do not have the ability to decrypt your data.
At no step along the way do we ever compromise the security of your password.
- Passwords are encrypted before they are stored in our database. At no point is an administrator able to retrieve your password. Nor does an administrator have the ability to set your password to a known value.
- When you activate your account, you are required to choose a password and set up a security question.
- If you forget your password or repeatedly try to log in with an incorrect password, the system will lock you out after a few attempts. You may then reset your password by correctly answering your security question.
- If you incorrectly answer your security question, you are again locked out after a few attempts.
- In the unlikely event that you forget your password and the answer to your security question, you must contact Corporate Backup Support directly for manual identity verification.
As each file is transferred to our data centre, we carefully verify its integrity against a known CRC signature. Files are re-verified each time they are written to disk. If any file fails verification, it is retransmitted from your system or recovered from the replication server. This ensures that the data stored on our servers is the same data that was stored on your system.
The Corporate Backup software clients communicate with our servers over a proprietary protocol that was designed specifically for Internet backup. Other Internet backup products that use popular web protocols like HTTP, FTP or WebDav can be vulnerable to hacker and virus attacks. The extreme popularity of these protocols makes them a target. It is extremely unlikely that a hacker is going to invest the time and effort to go after a proprietary protocol. Even if they did, our encryption has never been broken.
To maximize compatibility with home and corporate firewalls, the protocol used by our lightweight backup client was designed to look to a firewall just like the SSL protocol used in web browsers. This means that if you are able to surf to our web site, you will be able to connect with our backup software.
Specifically, our backup client runs on port 443 and mimics SSL’s handshaking protocol. Almost all firewalls will pass our backup traffic without reconfiguration. We also support the use of proxy servers. Our web browser interface also uses generic HTTP and HTTPS on ports 80 and 443.