In simple terms, encryption is a secret pass phrase that is applied to the contents of your files to ensure that they are completely unreadable without the means to do so along with that encryption key. Mozy encrypts your files on your computer before they are sent over the Internet to the Mozy cloud. Your files remain encrypted when stored in the Mozy cloud and can only be read if you have both the encryption key and the means to read the encrypted file.
When you install Mozy software, you might be able to select the type of encryption key you want to use for your backups. Whether you can choose and exactly which types of encryption keys are available depends on the type of account you have. MozyHome accounts can choose either the Mozy default encryption key or a personal encryption key. If you use MozyPro or MozyEnterprise, your administrator can determine the encryption key types that you can choose from or whether you can choose at all. That encryption is permanently associated with all files sent to the Mozy cloud from that computer.
You can change the encryption key type after you install the Mozy software. Doing this requires deleting the computer from the account and re-activating the software. If users are permitted to activate the software, a user can re-launch the setup wizard through the software and reactivate. Otherwise, you must uninstall the software, then reinstall and reactivate. The Mozy software then uploads all the files again to ensure that the stored files match the current encryption key.
The type of encryption key that is used determines whether some tasks are seamless and simple or whether extra steps are required. The Mozy default encryption key yields the least complicated experiences. A personal or corporate encryption key requires an extra set of steps for certain tasks. For example, if a personal encryption key is used, that key must be supplied to access files from the Mozy cloud when you use the Mozy mobile app. If a personal or corporate key is used, when you download files from the Mozy cloud using a web browser that you must then also use the Mozy decryption utility to supply that key. If a KMS key is used, you must use the backup software or Restore Manager to download and decrypt files.
With a few exceptions, most features of Mozy are available regardless of which type of encryption key is used.
If you use MozyPro or MozyEnterprise, some features might have been disabled by your administrator. For example, some organizations choose not to permit their users to access their files online.
Mozy separately stores the key. This option lets Mozy automatically decrypt your files when you download or restore them. This is the least complicated, most seamless experience for users, imposing no restrictions on any Mozy features.
To ensure you can download and restore your files, you must either remember your key indefinitely, or you can save it and store it separately. If you choose to save it, a plain text file is saved to the location you choose. The file contains only the characters you entered when creating your key. To ensure you can always provide your key, it is best not to save it only on your computer, which could fail, or only anywhere else which you could easily lose or damage, such as a USB stick.
When you download and restore files, you must supply this key to decrypt those files. Mozy does not have access to your personal encryption key and cannot decrypt files for you. This means that if you lose your key, Mozy cannot help you decrypt your files. Even under force of law, Mozy cannot decrypt your files if you choose to use a personal encryption key. When you reinstall the Mozy software or install it on a replacement computer, you must supply this same key to ensure continued access to files you have previously backed up.
If you choose to use a personal encryption key and you also use the Mozy mobile app, you must provide your personal key to view and download files from the Mozy mobile app. For more information, see Provide Personal Encryption Key in the Mozy Mobile App.
If you choose to use a personal encryption key with Mozy Sync, each instance of the sync software you install must use exactly that same key.
If you use a personal encryption key, several Mozy features are affected.
If you use a corporate encryption key, several Mozy features are affected.
If you use KMS encryption keys, several Mozy features are affected.
If you have a MozyHome account, you can use the same type of encryption key, or the exact same personal encryption key, when you install each instance of the backup software. Or, you can choose to install each instance of the backup software with a different type of encryption key, or a different personal encryption key. You can install Mozy Sync with the same encryption key as the backup software or a different one; however, all your instances of Mozy Sync must use the exact same encryption key. In making these choices during installation, you can choose to create the simplest experience possible when downloading or restoring files. Or, you can choose to be responsible for managing the most secure experience, which can also be the most complex.
If you have a MozyPro or MozyEnterprise account, you might not be able to choose which type of encryption to use. Or, your administrator specifies which types you can choose from. If you can choose, the same considerations that are described for a MozyHome account apply to you as well. As always, if you use Mozy Sync, each installed instance must use not only the same type of encryption, but the exact same key.
With this scheme, you never need to remember or supply an encryption key to use any Mozy features.
With this scheme, you must always be able to provide each key as necessary to use certain Mozy features, particularly when restoring or downloading files, or when installing any Mozy software when you replace any computer.
- The Best Encryption Software for 2019 | PCMag.com - October 21st, 2019
- What is data encryption? - October 19th, 2019
- USB Enforced Encryption - Endpoint Protector - October 19th, 2019
- Authenticated encryption - Crypto++ Wiki - October 19th, 2019
- Tinder's Lack of Encryption Lets Strangers Spy on Your ... - October 19th, 2019
- 'Without Encryption, We Will Lose All Privacy': Snowden ... - October 18th, 2019
- Security pros reiterate warning against encryption backdoors - October 18th, 2019
- Encryption - servicepro.wiki - October 18th, 2019
- Optical Encryption Market Size, Share, Trends and Forecast ... - October 18th, 2019
- MySQL Enterprise Transparent Data Encryption (TDE) - October 18th, 2019
- What is Encryption? - Definition from WhatIs.com - October 17th, 2019
- How to Set Up BitLocker Encryption on Windows - October 2nd, 2019
- Encryption: What It Is, and How It Works for You | Tom's Guide - October 2nd, 2019
- Security Encryption Systems | HowStuffWorks - October 2nd, 2019
- What is The Difference Between Hashing and Encrypting - October 2nd, 2019
- How Encryption Works | HowStuffWorks - September 5th, 2019
- encryption - How secure is AES-256? - Cryptography Stack ... - June 2nd, 2019
- The World's Email Encryption Software Relies on One Guy, Who ... - May 5th, 2019
- Encryption breakthrough could keep prying eyes away from your ... - May 5th, 2019
- What Is Data Encryption? Definition, Best Practices & More ... - May 1st, 2019
- IronClad Encryption Partners with Data443 Risk Mitigation ... - April 30th, 2019
- What Is Encryption? An Overview of Modern Encryption ... - April 30th, 2019
- Symmetric vs. Asymmetric Encryption What are differences? - April 29th, 2019
- Difference Between Hashing and Encryption - ssl2buy.com - April 29th, 2019
- What is Advanced Encryption Standard (AES)? - Definition ... - April 29th, 2019
- How to Encrypt Your Wireless Network - Lifewire - April 29th, 2019
- After Paris, Encryption Will Be a Key Issue in the 2016 ... - April 22nd, 2019
- Email encryption - Wikipedia - April 8th, 2019
- What is Encryption, and Why Are People Afraid of It? - April 8th, 2019
- Data encryption | cryptology | Britannica.com - April 8th, 2019
- How to Enable Full-Disk Encryption on Windows 10 - April 1st, 2019
- After Paris, Encryption Will Be a Key Issue in the 2016 Race - March 27th, 2019
- Does Encryption Really Help ISIS? Heres What You Need to ... - March 27th, 2019
- AES and RSA Encryption Explained - March 27th, 2019
- Encryption: What it is and why its important - Norton - March 23rd, 2019
- Email encryption in transit - Gmail Help - March 21st, 2019
- Authenticated encryption - Wikipedia - March 19th, 2019
- Email Encryption Options for MDaemon Email Server - March 14th, 2019
- How to Encrypt Files on Windows - Tutorial - Toms Guide - March 6th, 2019
- Encryption, Key Management - bank information security - March 5th, 2019
- Which Types of Encryption are Most Secure? - February 7th, 2019
- JSON Object Signing and Encryption (JOSE) - February 4th, 2019
- What Is Encryption, and How Does It Work? - January 26th, 2019
- The Pitfalls of Facebook Merging Messenger, Instagram, and ... - January 26th, 2019
- Encryption: Avoiding the Pitfalls That Can Lead to Breaches - January 14th, 2019
- Encryption | Information Technology Services - December 31st, 2018
- Encryption - Investopedia - December 16th, 2018
- How to Protect Data at Rest with Amazon EC2 Instance Store ... - December 9th, 2018
- Next Generation Encryption - blogs.cisco.com - December 4th, 2018
- 3 Different Data Encryption Methods - DataShield blog - November 22nd, 2018
- Security and encryption | Documentation | Turtl - November 18th, 2018
- Encryption | General Data Protection Regulation (GDPR) - November 16th, 2018
- Using Encryption and Authentication Correctly (for PHP ... - November 13th, 2018
- Encryption | SANS Security Awareness - November 9th, 2018
- Types of Encryption | Office of Information Technology - November 5th, 2018
- Use Your own Encryption Keys with S3s Server-Side ... - October 29th, 2018
- What is Tokenization vs Encryption - Benefits & Uses Cases ... - October 12th, 2018
- Device Encryption | it.ucsf.edu - October 12th, 2018
- 5 Common Encryption Algorithms and the Unbreakables of the Future - September 15th, 2018
- Top 5 best encryption software tools of 2018 | TechRadar - August 26th, 2018
- New EBS Encryption for Additional Data Protection | AWS ... - August 22nd, 2018
- Best Encryption Software 2018 - Encrypt Files on Windows PCs - August 20th, 2018
- Download BestCrypt Volume Encryption 3.78.05 / 4.01.09 Beta - July 26th, 2018
- End-to-end encryption - Wikipedia - July 24th, 2018
- Download Symantec Encryption Desktop 10.4.0 Build 1100 - July 15th, 2018
- HTTPS - Wikipedia - July 10th, 2018
- AES encryption - June 20th, 2018
- Encrypt email messages - Outlook - June 20th, 2018
- Download Sophos Free Encryption 18.104.22.168 - softpedia.com - June 19th, 2018
- Does Skype use encryption? | Skype Support - June 16th, 2018
- Encryption- Computer & Information Security - Information ... - May 25th, 2018
- Enable BitLocker on USB Flash Drives to Protect Data - May 25th, 2018
- Transparent Data Encryption (TDE) - msdn.microsoft.com - April 12th, 2018
- Encryption Software Market - Global Forecast to 2022 - March 24th, 2018
- What AES Encryption Is And How It's Used To Secure File Transfers - March 24th, 2018
- Encryption vs. Cryptography - What is the Difference? - March 24th, 2018
- Energy-efficient encryption for the internet of things | MIT News - February 16th, 2018
- The Best Encryption Software - TopTenReviews - February 16th, 2018
- File-Based Encryption | Android Open Source Project - February 7th, 2018
- Beyond Encryption | Secure Enterprise email using existing ... - February 1st, 2018