Ransomware has become an increasing menace affecting private users and businesses each day. As we have already described in another article titled Ransomware - how to protect yourself the best way to be prepared and protect your data is by performing regular backups to offsite locations, preferably to computers that are purely used for data storage.
An alternative solution to storing data offsite (similarly to locations such as cloud and FTP) is to install SyncBack Touch on your remote computers/devices running Windows, macOS, Linux or Android so you can store your data on them by using SyncBackPro/SE.
If you are not familiar with the concept of SyncBack Touch then you can read about it on our website which provides more details, usage examples, download links plus an introduction video for the product.
Once you have installed it on the target computer/device you will have to ensure that the instance of SyncBack Touch is accessible in order for SyncBackPro/SE to be able to communicate with it. In our article titled Configuring SyncBack Touch to backup files over the Internet we describe the steps needed in order to achieve this.
Creating a SyncBackPro/SE profile targeting your SyncBack Touch is very easy and similar to creating other profile types. Our article titled Creating a SyncBack Touch profile describes the step by step creation of such a profile.
SyncBack Touch uses a proprietary interface for its communication protocol plus all data transmission is encrypted, so it is highly unlikely that anyone can connect to it unless using SyncBackPro/SE. Therefore, it is best to set authentication to ensure that only your instance of SyncBackPro/SE can connect to it.
Once you have everything installed properly, and you have tested and verified that SyncBackPro/SE can communicate with SyncBack Touch without problems, then you may consider adding an extra layer of security by setting SyncBack Touch to require authentication before allowing a connection.
By default, SyncBack Touch doesn’t require authentication which may be fine if you are using it within a local network which is protected from the outside by a firewall but it is strongly recommended to set authentication for instances of SyncBack Touch that are running at offsite locations accessible via the internet.
SyncBack Touch can be configured in three different ways in regards to authentication:
SyncBack Touch is availabe for Windows, macOS, Linux and Android.
Both SyncBackPro and SyncBackSE ship with two free connections to SyncBack Touch.
SyncBack Touch is a viable secure alternative solution to offsite data storage against ransomware that is owned and managed entirely by the user.