Selecting Your Encryption Key

It is VERY important that you select a proper Encryption Key. This is literally the key to your data security. Remote Backup uses the industry's most secure encryption technology. However, even the latest, most secure encryption technology can be compromised by using a bad Encryption Key. There are some rules.



Remember - the longer and more complex your encryption key is, the more secure your data. There are several ways to crack encryption - guessing, using a Dictionary program, brute force, or hardware-related methods.

Guessing - Hackers use this method first. They try to guess your encryption key by using combinations of information they know about you. Your name, your address, your phone number, your dog's name, your spouse's pet name - all are common encryption keys that can be guessed. If someone who wants to hack your password gains access to your desk, they will look around at your pictures, your stuff, and try to guess your password based on what they see. They may even look up the middle names of your children and other info about you in public records.

Dictionary Program - An attack with a dictionary program uses a database of words from the dictionary to try to crack your encryption key. If you use a common word or phrase, spelled properly, a Dictionary attack may take only a matter of minutes using a regular home PC.

Brute Force - This method requires an enormous amount of computing power, time, and manpower. But, it has been effective in cracking some low-level encryption techniques. Remote Backup uses extremely high-level encryption technology. In Brute Force attacks, hackers use high-speed computers to try many different combinations of letters and numbers until maybe, some day, one of their combinations work. This is the ONLY way to attack most high-level encryption techniques.

Sniffers - Less common than any of the other three methods, this method and other similar hardware-related methods seem to be born out of science fiction. But, they ARE real. Unauthorized visitors to your company can leave behind devices that send everything on your network or computer to a remote location. There's even a device that can be built out of common electronic parts that lets someone read everything on your computer monitor from as much as 100 meters away - without the need to actually see the monitor. They pick up the electronic pulses generated by your computer monitor as you type and translate them to screen images on the hacker's terminal. Amazing.






Note: DO NOT use any of these examples!