We recommend using 2 random words, at least 1 special character, 1 number and 1 upper case letter.
For example: - Fish2J@ngle is seen as a strong password.

You can simply reset it through the app by pressing Password Reset, which will ask you for the email address that you used when you originally set up your account. We will send a secure link to your email for you to create a new temporary password. Remember to check your junk file. Please remember that when you re-enter the app you will need to go into the password facility within ‘my profile’ to create a new personalised password.

Cloud computing lets you keep information on a remote server or multiple servers(the cloud), instead of trapped in a computer. You can access your data from a smart phone, a tablet, a laptop, or a desktop—in fact, wherever you have an internet connection. (As 1file4life is an app you can access it via your phone or tablet). We make use of the cloud in some of our daily activities but have little or no idea we’re really doing that. Here are a few examples of how we use the cloud:
Uploading a picture to your social media accounts e.g. Instagram orFacebook simply means uploading to the cloud - how else do you think you’ve been able to re-visit your account and still find your pictures there?
Making use of web-based email services e.g. Gmail, yahoo mail etc. Web based email services all have their emails stored on servers which allows you access to your mails without internet connection or your mailbox from anyP.C anywhere! It also means you’ll be able to recover your emails if something happens to your phone. (The only downside with plain old e-mail is that it is unsecure and can get cluttered).
We use Amazon web services(AWS) owned by Amazon for our cloud storage which has been around since 2006 and is used by a host of popular sites includingInstagram and Pinterest.

We have end to end SS3-SE server-side encryption for your data, stored on world class Amazon Web Services servers, and our systems have been tested by Pen Testing professionals to ensure your important documents are safe. Through a mixture of encryption, leveraging the Amazon servers and system monitoring, we are keeping your data safe and secure.

We encrypt with a data key using the industry-standard AES-256 algorithm.

We work with Amazon Web Services (AWS), the world’s largest data centres to securely store your server. This has the added benefit that, as we grow, we will never run out of storage!

A penetration test has been performed by Securios who are a UK based independent cyber security compliance company who help businesses protect themselves against cyber threats. Securios adhere to industry standards and have evaluated the security of our app. The test has been carried out to show both vulnerabilities and strengths, including the potential for unauthorised parties to gain access to the system's features and data. Securios completed a security test of the 1File4Life mobile application for both Android and iOS. The test included analysing the code which the mobile applications are created from. It also included any systems that the mobile application was exchanging data with. The focus was to identify any security-related issues or bad practice. A certificate has successfully been granted to 1file4life to confirm that we have passed all necessary industry requirements and high security standards required to ensure that your data is encrypted, safe and secure at all times. (We offer an encrypted, secure facility in the form of a private digital security box, which eradicates the need to use unsecured e-mail to store and send valuable and confidential documents and policies).

Emails have been around nearly as long as the internet. Simple text messages sent back and forth via online platforms helped shape the internet when it was still embryonic and continues to serve as the backbone of the worldwide web even today.
Despite its age, this ubiquitous platform hasn’t changed much over the years. It still relies on email addresses and simple text formats. Senders still sign off on their messages as if they’re letters. In some ways, these messages are even worse than the handcrafted letters of yore. They’re less secure and easily intercepted.
Unencrypted emails
Emails are unsecured by design. Complex hacking tools have far outpaced the security systems built into mainstream email platforms. Yet billions of emails containing vital information are sent across the lines everyday. Users send tax returns, new login details, job applications, password reset information, and medical records via emails.
Almost all these messages are easily intercepted. Even Google admits emails are unsecure, saying 40 to 50 percent of all emails are unsecured. Considering there are over 38 trillion emails sent across each year, this is a major security concern.
In fact, the security standard that governs online emails, Simple Mail Transfer Protocol (SMTP), has no built in security features at all. This means the default state of all email services is unencrypted and open to attack, putting crucial information at risk.
The Journey of an unencrypted email
According to some experts, unencrypted emails are vulnerable to attack at every stage from sender to receiver.
The journey of an unencrypted email is not as straightforward as most people would expect. Emails tend to bounce around multiple points on their way from point A to point B.
When an email is sent, the text may or may not be encrypted at the source, depending on the email service provider. Even if the email is encrypted, mail service providers do not encrypt the data they receive on their servers. This is the first point of vulnerability. Senders have no visibility on what happens to their message after their email service provider sends the message to another service provider. This is the second leg of the journey where the email could be compromised.
If the recipient’s email provider is unencrypted, most mainstream email providers will send the message across as plain text, compromising data security. However, the most vulnerable leg of the journey of an unsecured email is at the receiver’s end. The final destination is where most emails are compromised, according to security experts.
Final Thoughts
It’s clear that the journey an email goes through, from the first draft to the final recipient is different based on the level of encryption. While unencrypted messages are vulnerable at every step of the way, Get 1file4life today and be encrypted all the way.

If you close your account, we delete your data after a month (in case you change your mind), or immediately if requested.

To reactivate your account, please get in touch with

The app can be used on a tablet

You can load your app onto 4 separate devices.

Should there be a reason for us to close, we would firstly work with strategic partners for them to carry on the service. Or we would notify you 3 months before and keep you up to date to ensure your data can be transferred and you retain your files.

Our service has been built since the inception of GDPR and created to ensure it matches their requirements. We do not get to view your personal data; your data is locked in your digital security box.

As far as your 1File4Life account, it will be safe if someone else finds your phone as it is password protected. You can simply download the app on your new phone and login with your details.

Please get in touch with There is a general question form at the bottom of the home page. How do I select a date of birth when registering the app on an android phone? Please refer to the PDF Android instructions for this App which is on this website.

You will need to scan multi-pages in as one document and then save this to your app. For tech support please contact

Has our App been security tested?

Here's our certificate, your data is encrypted, safe and secure at all times. 

need to ask something else?


  • Wessex House, Teign Road, Newton Abbot, Devon, TQ12 4AA

  • 01752 956949

  • Louise marsh 07855 226849

  • Charlotte Harverson 07730 777219