Data Encryption
At LeSoft, protecting the confidentiality and integrity of your data is our top priority. We utilize robust data encryption mechanisms to ensure that your information is secure, whether it is in transit or stored on our systems.
What is Data Encryption?
Data encryption is the process of converting sensitive data into a scrambled format using encryption algorithms. This ensures that unauthorized parties cannot read or tamper with your data. At LeSoft, we employ industry-standard encryption protocols to protect your information.
Encryption
In Transit:
All customer data transmitted to Lesoft servers across public networks is protected using robust encryption protocols. We enforce the use of Transport Layer Security (TLS 1.2/1.3) with strong cipher suites for all access points, including web browsers, APIs, mobile applications, and IMAP/POP/SMTP email clients. This ensures authenticated, encrypted communication between systems. For email transmission, Lesoft uses opportunistic TLS by default, helping prevent unauthorized interception during transit when peer servers support this protocol.
We fully support Perfect Forward Secrecy (PFS) to safeguard past communications in the unlikely event of future key compromise. Additionally, HTTP Strict Transport Security (HSTS) is implemented across all web services, instructing browsers to connect only via HTTPS. Authentication cookies used in web sessions are marked as secure to prevent exposure.
At Rest:
Sensitive customer data stored within Lesoft systems is encrypted using the 256-bit Advanced Encryption Standard (AES). The types of data encrypted depend on the services a customer uses. Lesoft manages encryption keys using an internal Key Management System (KMS), with an added layer of protection where data encryption keys are themselves encrypted with master keys. These keys are stored on separate, access-restricted servers to maximize security.
All encryption methods used at Lesoft are aligned with NIST-recommended standards for secure cryptographic practices.
For more detailed technical information about Lesoft’s encryption standards or coverage across services, please contact: [email protected].