ExplainingComputers | Cyber Security: Backups & Encryption @ExplainingComputers | Uploaded November 2021 | Updated October 2024, 6 days ago.
Protecting your data using the 3-2-1- rule, an appropriate mix of personal data storage categories, and encryption as required.
The "VeraCrypt Encryped USB Drive" video I mention is here:
youtube.com/watch?v=XshQWFLfwdA
And my recent video “Cyber Security: Protecting Your Online Accounts” is here: youtube.com/watch?v=uYUfOP4UKSM
You can download the free VeraCrypt encryption software from:
https://www.veracrypt.fr/
More videos on computing and related topics can be found at youtube.com/explainingcomputers
You may also like my ExplainingTheFuture channel at: youtube.com/explainingthefuture
Chapters:
00:00 Introduction
00:44 The Range of Threats
02:10 Data Storage Categories
04:36 3-2-1 & Beyond
07:01 Backup Media
08:31 Backup Security
09:44 Encryption Options
11:44 Investing Time
#Security #Backups #Encryption #ExplainingComputers
Protecting your data using the 3-2-1- rule, an appropriate mix of personal data storage categories, and encryption as required.
The "VeraCrypt Encryped USB Drive" video I mention is here:
youtube.com/watch?v=XshQWFLfwdA
And my recent video “Cyber Security: Protecting Your Online Accounts” is here: youtube.com/watch?v=uYUfOP4UKSM
You can download the free VeraCrypt encryption software from:
https://www.veracrypt.fr/
More videos on computing and related topics can be found at youtube.com/explainingcomputers
You may also like my ExplainingTheFuture channel at: youtube.com/explainingthefuture
Chapters:
00:00 Introduction
00:44 The Range of Threats
02:10 Data Storage Categories
04:36 3-2-1 & Beyond
07:01 Backup Media
08:31 Backup Security
09:44 Encryption Options
11:44 Investing Time
#Security #Backups #Encryption #ExplainingComputers