Ransomware has become an increasing menace affecting private users and businesses each day. As we have already described in another article titled Ransomware - how to protect yourself the best way to be prepared and protect your data is by performing regular backups to offsite locations, preferably to computers that are purely used for data storage.
An alternative solution to storing data offsite (similarly to locations such as cloud and FTP) is to install SyncBack Touch on your remote computers/devices running Windows, macOS, Linux or Android so you can store your data on them by using SyncBackPro/SE.
If you are not familiar with the concept of SyncBack Touch then you can read about it on our website which provides more details, usage examples, download links plus an introduction video for the product.
Once you have installed it on the target computer/device you will have to ensure that the instance of SyncBack Touch is accessible for SyncBackPro/SE to be able to communicate with it. In our article titled Configuring SyncBack Touch to backup files over the Internet we describe the steps needed in order to achieve this.
Creating a SyncBackPro/SE profile targeting your SyncBack Touch is very easy and like creating other profile types. Our article titled Creating a SyncBack Touch profile describes the step by step creation of such a profile. If you are using SyncBackPro/SE V10 (or newer) then you can also configure SyncBack Touch to detect ransomware on the device it is installed on.
SyncBack Touch uses a proprietary interface for its communication protocol plus all data transmission is encrypted, so it is highly unlikely that anyone can connect to it unless using SyncBackPro/SE. Therefore, it is best to set authentication to ensure that only your instance of SyncBackPro/SE can connect to it.
Once you have everything installed properly, and you have tested and verified that SyncBackPro/SE can communicate with SyncBack Touch without problems, then you may consider adding an extra layer of security by setting SyncBack Touch to require authentication before allowing a connection.
By default, SyncBack Touch doesn’t require authentication which may be fine if you are using it within a local network which is protected from the outside by a firewall but it is strongly recommended to set authentication for instances of SyncBack Touch that are running at offsite locations accessible via the internet.
SyncBack Touch can be configured in three different ways in regard to authentication:
SyncBack Touch is a viable, reliable and secure alternative solution to ransomware protection. And one that is owned and managed entirely by the user.
SyncBackPro/SE V10 (and newer) users can use SyncBack Touch for free, so there is no excuse not to give it a try and discover the advantages of using SyncBack Touch.
© 2003-2024 2BrightSparks Pte. Ltd. | Home | Support | Privacy | Terms | Affiliate Program