It is VERY important that you select a proper Encryption Key. This is literally the key to your data security. Remote Backup uses the industry's most secure encryption technology. However, even the latest, most secure encryption technology can be compromised by using a bad Encryption Key. There are some rules.
Never use your name, your dog's name, ANYONE'S name, or part thereof.
Never use any part of your telephone number, address, or any other identifying information about yourself.
Never use a properly spelled common word or proper noun.
Never use a key shorter than ten characters.
Never use the same encryption key and/or password for different services.
Never use the brand of your favorite car, horse, motorcycle, vacation spot, etc.
DO use a key with more than ten characters. The more the better.
DO use a key with mixed letters and numbers.
If you use actual words, misspell them.
Add unnecessary punctuation marks to the end of actual words or phrases.
Remember - the longer and more complex your encryption key is, the more secure your data. There are several ways to crack encryption - guessing, using a Dictionary program, brute force, or hardware-related methods.
Guessing - Hackers use this method first. They try to guess your encryption key by using combinations of information they know about you. Your name, your address, your phone number, your dog's name, your spouse's pet name - all are common encryption keys that can be guessed. If someone who wants to hack your password gains access to your desk, they will look around at your pictures, your stuff, and try to guess your password based on what they see. They may even look up the middle names of your children and other info about you in public records.
Dictionary Program - An attack with a dictionary program uses a database of words from the dictionary to try to crack your encryption key. If you use a common word or phrase, spelled properly, a Dictionary attack may take only a matter of minutes using a regular home PC.
Brute Force - This method requires an enormous amount of computing power, time, and manpower. But, it has been effective in cracking some low-level encryption techniques. Remote Backup uses extremely high-level encryption technology. In Brute Force attacks, hackers use high-speed computers to try many different combinations of letters and numbers until maybe, some day, one of their combinations work. This is the ONLY way to attack most high-level encryption techniques.
Sniffers - Less common than any of the other three methods, this method and other similar hardware-related methods seem to be born out of science fiction. But, they ARE real. Unauthorized visitors to your company can leave behind devices that send everything on your network or computer to a remote location. There's even a device that can be built out of common electronic parts that lets someone read everything on your computer monitor from as much as 100 meters away - without the need to actually see the monitor. They pick up the electronic pulses generated by your computer monitor as you type and translate them to screen images on the hacker's terminal. Amazing.
Robert (my name)
Larry (my dog's name)
555-1212 (my phone number)
Jaguar (my favorite car)
Blackboard (just a regular word)
Examples of GOOD ENCRYPTION KEYS
theAzoRes# (a proper noun, mixed case, and with a trailing punctuation mark)
FrAn1klen-mAKes$-great%-breaD# (a phrase, misspelled, with punctuation and mixed case)
birds!of)a(featuer#flock^together (same as above)
asdASDLFJ#*sdfk98-98-0sdfk;jwq89ASDF3dsfkj9j30kld##cx (absolutely random - the best)
rooleftthetheatrethenwentforawalkdownbytheriver# (a phrase with punctuation mark)
Note: DO NOT use any of these examples!