You know that you need to be backing up your computer (and other devices). Using an online backup service is a good way to do this automatically. But how secure are online backups? Let’s see how to use a feature offered by some backup services to ensure that only you can access your data.
Note: This page contains affiliate links. As an Amazon Associate I earn from qualifying purchases. Please see Affiliate Disclosure.
You run the risk of losing the data on your computer (and other devices). Here are a few ways:
- Lose the device
- Device is stolen from you
- Ransomware encrypts your data
- Device dies (stops working)
- Device is destroyed in a natural disaster (fire, flood, etc.)
A backup you keep in your home isn’t good enough, because that backup could be destroyed at the same time as your device, by many of the same causes listed above. So, it’s wise to use online backups (sometimes called cloud backups).
When you install backup software on your device, most software will create an encryption key for you. The creator of the backup software will store that key with your account. Because the key is able to decrypt your data (make it readable), this gives the company the ability to access your data!
You may think, “I trust the company, so what’s the problem?” Maybe you trust the company itself, but do you trust every one of its employees? And what if the company is hacked? Or what if a government (one in your country or a foreign one) wants to see your data? For these reasons, it’s best to use your own encryption key.
How to Increase Your Security & Privacy
Instead of letting the backup software create your encryption key, and letting the backup company store that key, you should create your own encryption key and store it yourself. Different companies have different terms for this. You may see it called private encryption key, user-owned encryption key, user-defined encryption key, custom encryption key, or something similar.
When you create a private encryption key, your data is encrypted with that key. So if you’re the only one with the key, you’re the only one who can access your data! That means employees at the backup company can’t, hackers can’t, and governments can’t. (Note that encryption can be broken by those with enough resources and time. But that shouldn’t stop us from protecting our data.)
Your encryption key is like a password, so you should make it strong, just as you’d make a password strong. That means making it long (the more characters, the better), with a variety of character sets (uppercase, lowercase, numbers, special characters).
Now, this is important! If you lose your encryption key, you won’t be able to access the data you’ve backed up. Remember, the backup company doesn’t have your key, so they can’t help you. You must store your key somewhere safe. I recommend putting it in your password manager (I like LastPass).
If we provide your files to a law enforcement agency as set forth above, we will remove encryption from the files before providing them to law enforcement only if a default encryption key is used. We will not be able to decrypt any files that are encrypted using a user defined encryption key.
In other words, if you choose the default option (let the software create your encryption key, and let the company store it), the company is able to access your data and provide it to others. But if you use your own encryption key, they can’t.
As important as they are, security and privacy aren’t the only criteria to consider in an online backup service. Here are some other questions to ask, about the company and its service:
- How will my data be secured at rest (in storage)? How will it be secured while traveling (in transit)?
- Can the company see my data?
- How long has the company existed? How long has it been providing online backups?
- How do customers rate and review the company and service?
- How much storage do I get?
- Does the backup software run on all the operating systems my family uses?
- What happens when I delete a file from my device? Does it stay in the backup? How long?
- How many of my family’s devices can I back up?
- How many versions of each file are stored?
- What’s the cost?
IDrive is a cloud backup service that lets you create your own encryption key. Because of this, as well as the combination of other features and cost, I like IDrive as a provider. I also like SpiderOak, a company known for its strong stance on user privacy. There are other backup services that let you use your own encryption key. Here’s a list of a few I’m aware of:
I know there are others, and if there’s one you recommend, please leave a comment!
If you’re interested in IDrive, you can use this link to get 25% off your first year!
If you use an Apple iOS device (iPhone or iPad), you have the option of using Apple’s iCloud to back up to Apple’s servers. iCloud uses a private encryption key. According to Apple,
Your data is protected with a key derived from information unique to your device, combined with your device passcode, which only you know. No one else can access or read this data.
In addition to using your own encryption key, you should take other steps to protect your online backups. Those include using a strong password on your account, enabling two-factor authentication, and setting good security questions and answers.
- The best online backup service for securely encrypting your data (infoworld.com)
- IDrive® ensures strong security and privacy (idrive.com)
- Questions on data security in online backup, secured access and more (idrive.com)
- No Knowledge, Secure-by-Default Products (spideroak.com)
What You Should Do
- Choose a cloud backup service with strong security and privacy protection, which allows you to set your own encryption key.
- Set a private encryption key for your backups, and securely save it.
- Take other steps to protect your backups (strong password, two-factor authentication, security questions, etc.).