CocoFax Security Overview

We strive to keep your trust, as reflected in our security measures.

World-Class Data Encryption Protocols

CocoFax protects not just the faxes that you are sending, but also the faxes that you might have sent at any time in the past. The data encryption protocols of CocoFax are the same as those used by the top end IT companies in the world.

Every fax file that you attach with CocoFax is encrypted with 256-bit Advanced Encryption Standard (AES). Even the faxes in transit are encrypted, so no one other than the intended party can intercept your private communication.

System Architecture

CocoFax aims to deliver you premium performance, without compromising even slightly on the security of the system. This is why we have an n-tier architecture design for our system which boasts numerous protection layers for your data safety.

Security Testing of Application

CocoFax employs a team of quality analysts who check the application and every update constantly, searching for any bugs or security fixes. We allow no chance of any glitches or bugs with the application when it is ready and presented to you.

Key Management

CocoFax uses a key management system that’s only to be seen in the cutting-edge hi-tech IT security industries in the world. The keys that are used to encrypt the data have very limited access so that the members of CocoFax’s team cannot view your private faxes.

Two-Factor Authentication

Two-factor authentication creates an additional wall of security to keep your private data safe from any cyber attacks. With the Two-factor authentication, no one other than you can access your private account.

Biometric Security

CocoFax’s mobile phone applications have added biometric security layer so that the fax data on the user’s mobile is completely safe as well. This increases the individual identification accuracy for the entire system.

Web Application Firewalls

Web Application Firewalls (also known by their acronym, WAFs) are the natural defence of our system against any SQL injection attacks, cross-site forgery, and cross-site scripting.

DDoS Protection

DDoS attacks might be common nowadays, but they do not stand a chance with CocoFax. CocoFax’s CDN network capacity is 20 times larger than the biggest DDoS attack that has been created so far. Therefore, it is assured that CocoFax will continue to protect the system in the future as well.

Hardware Level Security

The security protocols are not just limited to the application software, they apply to the hardware as well. CocoFax stores all the private data in Swiss data centers. Each datacenter conforms to the highest security protocols present, such as ISO 27001 and the Cloud Security Alliance (CSA).

HIPAA Compliance

HIPAA deals with keeping healthcare and patient data completely safe and secure. CocoFax adheres to the strictest HIPAA compliance and follows every safeguard protocols listed by the HIPAA.

Every person’s Protected Health Information (PHI) and electronic Protected Health Information (ePHI) is provided with the security and privacy that it deserves.

PCI-DSS Compliance

Payment Card Industry- Data Security Standards (PCI- DSS) detail the security measures that are necessary to keep the financial transactions safe and secure.

CocoFax uses two payment gateways and both adhere to PCI- DSS. The first one is Strip which processes payments made through credit cards, the second one being PayPal. Any private credit card information or PayPal credentials will not be stored by CocoFax.

Advanced Security Controls

CocoFax’s professional members get advanced controls over how they want their data to be protected as well as their privacy settings. Some of these advanced security controls include:

Block Users:

If any user no longer works in your organization, you can block their access from CocoFax’s system with the Block Users controls. It can even be used in emergency conditions where you suspect a data breach in your organization.

Two- Factor Authentication Toggle:

There is an option to enable or disable the two-factor authentication on your CocoFax account for every platform individually.

Access Login:

Team administrators can make use of access logs to know which members of the team have accessed the system and when they accessed it. The access logs are detailed with the user ID, login time, as well as the IP address of the connection.

Business Associate Agreement (BAA):

If any enterprise users need a Business Associate Agreement to comply with health Insurance Portability and Accountability Act, CocoFax signs that as well.

Report a System Vulnerability

At CocoFax, we strive to provide the best security and privacy measures to each and every user. In this regard, we welcome any suggestions or reports from security researchers who have found a vulnerability in the system.

Our security team takes each legitimate report seriously and investigate it thoroughly. Therefore, if you feel that you have encountered a system vulnerability, you can report it to us right away.

If you want to report a bug in the system, you can mail us at: [email protected]