SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

Blog Feed Post

How to Encrypt Your Mac’s Time Machine Backup

You encrypt your Mac’s system drive like you should: if your computer is stolen, your data is safe from prying eyes. But on your desk, right next to your Mac, is a carbon copy of everything on your hard drive: your Time Machine backup. Wouldn’t anyone who grabbed that drive have access to all the same information?

Yes they would, which is why it’s important to encrypt your Time Machine drive. There are two ways to do this, and both are relatively straightforward. You can retroactively encrypt your existing Time Machine backup, which allows you to keep your old backups. The downside: this retroactive encryption can take a long time, which is why you might want to simply create an encrypted partition using Disk Utility and back up to that. Let’s go over both options.

 



The Slow, But Non-Destructive Option: Encrypt Your Current Backups

If you have Time Machine set up on your Mac already, you can encrypt your drive retroactively. The process is going to take a while—for a one terabyte mechanical drive, the process could take more than 24 straight hours—but you can start and stop the process as many times as you like.

Head to System Preferences > Time Machine, then click “Select Disk.”

Select your current backup drive, then click “Remove Disk.”

Yes, we have to remove the drive before we can start encrypting, but don’t worry: your backups will remain on the drive. Click the “Select Backup Disk” button.

Click your old Time Machine drive in the list of options, then check the “Encrypt backups” option.

You will be asked to create a password, and to leave a hint. Note that the hint field is mandatory: you can’t continue without adding one.

If you lose this password, you can’t recover any files from the drive, so don’t lose the password. Write it down and store it somewhere safe, like a lock box, and also store it in your password manager. If you need help thinking of a password, click the key icon to bring up the macOS password assistant.




Once you’ve set a password, click “Encrypt disk.” Your mac will start encrypting the drive; you can check the progress in the Time Machine pane in system settings.

This one-time process is not fast. Like we said before, a one terabyte drive can easily take more than 24 hours. You don’t need to leave the drive connected until the process is done: unmount the drive and encryption will start again the next time it’s connected. And backups will continue as normal during the encryption process.

The Quickest Option: Set up a New Encrypted Backup

If you’re setting up a new hard drive with Time Machine, or are simply willing to start over with a clean partition in order to avoid a long encryption period, you can set up an encrypted partition using Disk Utility. which you can find in Applications > Utilities. To get started, click your external drive in the left panel, then click the “Erase” button in the toolbar.

Give the partition some sort of time-travel-related name, then click the “Format” dropdown option.

Choose “Mac OS Extended (Journaled, Encrypted)” from the choices offered, then click the “Erase” button. You will be asked to choose an encryption key.

Whatever you choose, make sure you don’t lose this key: you won’t be able to recover files from your drive without it. Write it down and put the in your lock box, and store it in your password manager. If you like, you can click the Key icon to bring up the Password Assistant, which can help you create a password.

When you’re done, click “Choose” and the drive will be re-formatted. Head to Time Machine preferences and set up your newly encrypted drive as your Time Machine backup. You now have an encrypted Time Machine backup, without the waiting period of the above method.

The post How to Encrypt Your Mac’s Time Machine Backup appeared first on Technology News and Reviews | A2Z Support.

Read the original blog entry...

More Stories By Qamar Qrsh

Qamar is a leading authority on global business trends including ‘big data’, self-employment and the social media revolution. He’s the author of the award-winning book, Marketing Shortcuts for the Self-Employed (2011, Wiley) and a regular speaker for Technology Event. Qamar has spoken about global mega trends, big data and the social media revolution at conferences and business events around the world.

Latest Stories
Serverless applications increase developer productivity and time to market, by freeing engineers from spending time on infrastructure provisioning, configuration and management. Serverless also simplifies Operations and reduces cost - as the Kubernetes container infrastructure required to run these applications is automatically spun up and scaled precisely with the workload, to optimally handle all runtime requests. Recent advances in open source technology now allow organizations to run Serv...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
xMatters helps enterprises prevent, manage and resolve IT incidents. xMatters industry-leading Service Availability platform prevents IT issues from becoming big business problems. Large enterprises, small workgroups, and innovative DevOps teams rely on its proactive issue resolution service to maintain operational visibility and control in today's highly-fragmented IT environment. xMatters provides toolchain integrations to hundreds of IT management, security and DevOps tools. xMatters is the ...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...