In days of different crypto- and other malware threaten your digital assets to be irreversibly changed (encrypted) or moved to byte-heaven (deleted). But malware is not the only thing that threatens to make your data inevitably lost. Simple device failure, volume and directory corruption, transfer errors, lightnings, fire or water damage, … are all threats, which daily threaten to make your precious data inaccessible.

Looking at the above perspective, even when anti-malware would be 100% reliable (but it is certainly not), the risk to lose data would permanently exist. This is why we need a backup.

Backup basics

First of all, backup must be done regularly. It is of (almost) no use if your last backup has been done three years ago. Next, there must exist more than one (preferably at least 3) backup device, as it might happen some malware overwrites content of the backup when device is being attached to your computer.

Backup may be simple copy of files you make to your USB key. This is a nice and easy solution when you need to backup and later restore your documents in file-by file manner. Backup may also create an image of your computer. Such backup enables you fast restore of all programs and settings of your computer as it was on the time when backup was executed; but it may contain sensitive data user is not aware of.

As mentioned above, you may store your backup to external (USB) disk/key. Backup may be also stored to backup tape/network unit or even cloud. Regardless of the backup destination being used and besides backup reliability, you still need to be aware about backup security.


One of crucial checkpoints of ISO 27001 (which implies through GDPR and other legislation) is to properly prevent leakage of data and to properly secure your backup copies too. There are various methods to protect the backup data to be unauthorizedly accessed. One of methods is certainly encrypting the backup contents.

Encryption may be software or hardware. Software encryption is usually used within proprietary backup solutions, while some specific procedures being used (like for example rsync or simple copy) are not covered. The main advantage of software encryption is its ability to cover various output devices, from cheapest ones on.

Hardware encryption on the other side is bound to specific hardware to be used and mostly requires specific setup to be done before using it. But hardware encryption repays itself with much stronger and software-independent storage of encrypted data. Strength and software independence may be a crucial factor also when choosing 2Cript Mobile Data Safe USB storage to store your data.

2Cript drive may be treated as intermediate solution. It has strong 256-bit AES-XTS encryption so it is a hardware encryption device. On the other side, as we presented in previous article, encryption within 2Cript Mobile USB drive is hardware independent and operating-system agnostic. It behaves like ordinary USB drive. So, any backup software and/or hardware, which is capable of backing data to USB drive up, is able to backup data to encrypted 2Cript drive too.


For your convenience, we tested 2Cript drive with various operating systems and backup solutions on them. We may confirm we successfully used USB-enabled backup on all devices we tested including (but not limited to) on Windows, RPi, Synology, Ubuntu Linux and MacOS.


Regular backup protects your data. Encryption protects your backup against being revealed. Use both, use 2Cript.

2Cript is as easy as any USB disk to be used for Synology DSM Backup