If you have questions about the security system or the fear that someone is trying to grab your data in myXinet - please contact us right away. Our technical experts will do their best to check the availability of the problem and protect your data. We appreciate the trust of our customers and make every effort not to let you down.
We provide reliable storage of your data in myXinet with the help of modern solutions for information security.
PROTECTING YOUR DATA IN MYXINET
It delineates access rights for users and provides security at a basic level. But passwords are used by people, and this, most often, is the weakest point of the system. We recommend that you regularly check your computer for viruses that can steal passwords, set different passwords for different programs, do not leave your computer in public places, do not specify simple passwords (qwerty, password, etc.) or data that is available to a wide range of people - Your date of birth, phone numbers, your name, your dog's nickname, etc. Keep records with passwords in a safe place.
PASSWORD FOR ACCESS
ENCRYPTION CONNECTION AND PASSWORD
The combination of the HTTPS transfer protocol and the TLS cryptographic protocol with 256-bit encryption, which we use in myXinet, is one of the most secure methods of data transmission to date. Encryption reliably protects your password and data from theft during transmission over the network. Especially important is the use of encryption when using the myXinet system in networks with public access - for example, in public Wi-Fi networks.
SEPARATION OF DATABASES
Data from different clients is isolated from each other in the cloud storage. Another account does not have the ability to see your database even in the event of a technical failure. Each client myXinet sees only its data and in no way can access to other people's data.
A long-established and reliable way to ensure data recovery in the event of breakdowns of physical equipment on which data is stored. We also use it - we always have the ability to recover your data.
The use of redundant communication channels, protection from SQL injection and DDoS attacks and other standard security methods is a common place and rules of good taste for any self-respecting IT company. At us it too all is.