Liscio's Commitment to Security
We are committed to ensuring your secure use of the Liscio platform. Protecting your data is foundational to Liscio, and we implement industry-leading security measures to safeguard your information.
Encryption
We use 256-bit encryption to secure your data and files, both at rest and in transit. This encryption standard meets federal government security requirements, ensuring your information remains protected at all times.
Security Tokens
To protect file access, we utilize Amazon Web Services (AWS) Security Token Service, a security model also used by the federal government.
How It Works:
You must log in to the Liscio dashboard to access your files.
When you select a file link, Liscio generates a temporary, unique token that grants access to that specific file.
The token expires after approximately 15 minutes. If the link is selected again, a new token is generated.
This security measure authenticates, limits, and controls access, ensuring the highest level of protection for personally identifiable information (PII)—a core requirement of privacy laws.
Invite-Only Access
Liscio is an invite-only platform, meaning users can only access it through a verified email invitation. This greatly reduces the risk of phishing scams and spoofed messages, keeping your communication channel secure.
Multi-Factor Authentication (MFA)
Liscio supports Multi-Factor Authentication (MFA) using the most common MFA applications. We strongly recommend that all users—both Clients and Firms—enable MFA for an additional layer of security.
By implementing these robust security measures, we ensure your data remains private, protected, and accessible only to authorized users.