Here are some of the questions our Support team gets asked frequently
Anytime during your trial period, you can subscribe to the paid version. If you do not sign up within this period, your account is deactivated. All the users will be locked out of the system, except for the owner of the account. The owner is able to go into the account and reactivate the subscription. We retain your data for 180 days. After that, your data will be deleted and we will have no way to recover it.
In Core, do we have to set up our own SMTP relay or configure SMTP credentials to send or receive emails?
Does Core allow us to send emails with attachments? Is there a limit on the size of outgoing emails?
What is SSL and will it keep my communication absolutely secure? Why do I see https instead of http in my browser?
Core’s servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. These controls include 24/7 monitoring and surveillance, on-site security staff and regular ongoing security audits. Core maintains multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages. If an unlikely event occurs, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep Core and your business running. Our servers transmit data securely, across encrypted links.
Data is encrypted using industry-standard TLS (Transport Layer Security) with multiple layers of security controls including firewalls, intrusion protection systems and network segregation. Access to our data centers and servers is controlled and monitored 24/7 by humans and computers, thus protecting your personal and financial data. We also perform regular security audits. Your data is also secured at rest when it is stored on our servers, and encrypted when we transfer it between data centers for backup and replication.
We provide standard access to the Core software through a login and password. We follow a strong password policy and ensure user authentication in every possible way.
Our Security Team proactively monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.