SYS-CON MEDIA Authors: Pat Romanski, Gary Arora, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Blog Feed Post

How to Encrypt Your Mac’s Time Machine Backup

You encrypt your Mac’s system drive like you should: if your computer is stolen, your data is safe from prying eyes. But on your desk, right next to your Mac, is a carbon copy of everything on your hard drive: your Time Machine backup. Wouldn’t anyone who grabbed that drive have access to all the same information?

Yes they would, which is why it’s important to encrypt your Time Machine drive. There are two ways to do this, and both are relatively straightforward. You can retroactively encrypt your existing Time Machine backup, which allows you to keep your old backups. The downside: this retroactive encryption can take a long time, which is why you might want to simply create an encrypted partition using Disk Utility and back up to that. Let’s go over both options.

 



The Slow, But Non-Destructive Option: Encrypt Your Current Backups

If you have Time Machine set up on your Mac already, you can encrypt your drive retroactively. The process is going to take a while—for a one terabyte mechanical drive, the process could take more than 24 straight hours—but you can start and stop the process as many times as you like.

Head to System Preferences > Time Machine, then click “Select Disk.”

Select your current backup drive, then click “Remove Disk.”

Yes, we have to remove the drive before we can start encrypting, but don’t worry: your backups will remain on the drive. Click the “Select Backup Disk” button.

Click your old Time Machine drive in the list of options, then check the “Encrypt backups” option.

You will be asked to create a password, and to leave a hint. Note that the hint field is mandatory: you can’t continue without adding one.

If you lose this password, you can’t recover any files from the drive, so don’t lose the password. Write it down and store it somewhere safe, like a lock box, and also store it in your password manager. If you need help thinking of a password, click the key icon to bring up the macOS password assistant.




Once you’ve set a password, click “Encrypt disk.” Your mac will start encrypting the drive; you can check the progress in the Time Machine pane in system settings.

This one-time process is not fast. Like we said before, a one terabyte drive can easily take more than 24 hours. You don’t need to leave the drive connected until the process is done: unmount the drive and encryption will start again the next time it’s connected. And backups will continue as normal during the encryption process.

The Quickest Option: Set up a New Encrypted Backup

If you’re setting up a new hard drive with Time Machine, or are simply willing to start over with a clean partition in order to avoid a long encryption period, you can set up an encrypted partition using Disk Utility. which you can find in Applications > Utilities. To get started, click your external drive in the left panel, then click the “Erase” button in the toolbar.

Give the partition some sort of time-travel-related name, then click the “Format” dropdown option.

Choose “Mac OS Extended (Journaled, Encrypted)” from the choices offered, then click the “Erase” button. You will be asked to choose an encryption key.

Whatever you choose, make sure you don’t lose this key: you won’t be able to recover files from your drive without it. Write it down and put the in your lock box, and store it in your password manager. If you like, you can click the Key icon to bring up the Password Assistant, which can help you create a password.

When you’re done, click “Choose” and the drive will be re-formatted. Head to Time Machine preferences and set up your newly encrypted drive as your Time Machine backup. You now have an encrypted Time Machine backup, without the waiting period of the above method.

The post How to Encrypt Your Mac’s Time Machine Backup appeared first on Technology News and Reviews | A2Z Support.

Read the original blog entry...

More Stories By Qamar Qrsh

Qamar is a leading authority on global business trends including ‘big data’, self-employment and the social media revolution. He’s the author of the award-winning book, Marketing Shortcuts for the Self-Employed (2011, Wiley) and a regular speaker for Technology Event. Qamar has spoken about global mega trends, big data and the social media revolution at conferences and business events around the world.

Latest Stories
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions.
Keeping an application running at scale can be a daunting task. When do you need to add more capacity? Larger databases? Additional servers? These questions get harder as the complexity of your application grows. Microservice based architectures and cloud-based dynamic infrastructures are technologies that help you keep your application running with high availability, even during times of extreme scaling. But real cloud success, at scale, requires much more than a basic lift-and-shift migrati...
David Friend is the co-founder and CEO of Wasabi, the hot cloud storage company that delivers fast, low-cost, and reliable cloud storage. Prior to Wasabi, David co-founded Carbonite, one of the world's leading cloud backup companies. A successful tech entrepreneur for more than 30 years, David got his start at ARP Instruments, a manufacturer of synthesizers for rock bands, where he worked with leading musicians of the day like Stevie Wonder, Pete Townsend of The Who, and Led Zeppelin. David has ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Addteq is a leader in providing business solutions to Enterprise clients. Addteq has been in the business for more than 10 years. Through the use of DevOps automation, Addteq strives on creating innovative solutions to solve business processes. Clients depend on Addteq to modernize the software delivery process by providing Atlassian solutions, create custom add-ons, conduct training, offer hosting, perform DevOps services, and provide overall support services.
Contino is a global technical consultancy that helps highly-regulated enterprises transform faster, modernizing their way of working through DevOps and cloud computing. They focus on building capability and assisting our clients to in-source strategic technology capability so they get to market quickly and build their own innovation engine.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...