Bredy Network Management Corporation Blogs

2 minutes reading time (443 words)

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call BNMC today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Business Computing Hackers Internet Software Hosted Solutions Ransomware Microsoft Business Google Network Security Computer Smartphone Mobile Devices Android IT Services Windows Managed IT Services Backup Data Management Tech Term Windows 10 Small Business Internet of Things Browser Cloud Computing Innovation App Business Continuity Hardware User Tips Data Recovery Encryption Data Artificial Intelligence Server Saving Money Remote Monitoring IT Support Infrastructure Business Management Gmail Smartphones Productivity Outsourced IT Managed Service Provider IT Support Phishing Productivity Tip of the week Cybersecurity Office 365 Data Backup Efficiency Vulnerability IT Management Disaster Recovery Managed IT Services Big Data Passwords Robot Word Windows 10 Settings Chrome Data storage Facebook Money Communication Antivirus Government Risk Management Google Drive Social Media Bandwidth Upgrade Office Tips Data loss Unified Threat Management Data Security Server Management Telephone Systems Business Technology Mobile Security Analytics Apple Virtual Private Network communications The Internet of Things Applications Storage Monitors Vendor Management Firewall Save Money Maintenance Automation Network End of Support Virtual Reality Two-factor Authentication Employer-Employee Relationship Spam Computing Workplace Tips Outlook WiFi Scam YouTube Mobile Device LiFi SaaS Hosted Solution Paperless Office Administration Holiday Website Microsoft Office BYOD Content Filtering Mouse Alert VPN HIPAA Miscellaneous Display Cyber Monday IT solutions Going Green Virtual Desktop Politics Licensing Dongle Google Docs Sports Legislation Education Hacks Assessment Laptop Customer Service Digital Payment Office Samsung Microsoft Excel Smart Tech Google Wallet desktop Touchscreen SharePoint Bitcoin Digital Managed IT Smart Technology Router Printing Disaster Tech Support Quick Tips Techology Cooperation Business Growth Service Level Agreement Statistics Tablet Compliance Password VoIP Collaboration How To Lenovo Hotspot Internet Exlporer Legal Chromebook Downtime Social Engineering Mail Merge Blockchain Unified Communications Connectivity Drones Cybercrime Downloads IT Technicians Windows 8 Marketing Document Management Spyware Shortcut Distributed Denial of Service Modem Uninterrupted Power Supply Websites VoIP Unified Threat Management Staff Hacker Leominster Bluetooth Comparison Regulations File Sharing Firefox Superfish Language Deep Learning Value Gadgets Computer Care IBM Mirgation Wireless Safety Address Permissions IoT Solid State Drive Identity Theft Remote Computing Patch Management Managed IT Service Cookies Avoiding Downtime User Error Augmented Reality Alt Codes K-12 Schools Network Congestion Specifications Social Networking Customer Relationship Management Computing Infrastructure Bring Your Own Device Professional Services Operating System Users Halloween Training Corporate Profile Multi-Factor Security Chatbots Social Automobile Star Wars Budget Hard Disk Drive Heating/Cooling Writing Break Fix Nanotechnology Information Technology Dell Wi-Fi Time Management Printer Wearable Technology Typing Network upgrade Humor WannaCry Computers Search Black Friday Motherboard Current Events Cabling Networking Alerts Best Practice USB Scary Stories Servers Google Calendar Identity Google Maps Emergency Fraud Cost Management Running Cable Dark Data Buisness Retail Dark Web Apps Screen Reader Network Management Access Control Cryptocurrency GPS BDR Mobile Data How To Work/Life Balance IT Consultant Recovery Cameras Health Private Cloud Work Tracking Black Market Meetings Law Enforcement Cleaning Notifications CCTV Electronic Medical Records Optimization Twitter Webcam Physical Security Emoji Mobile Device Management Upgrades Gadget Recycling Error Crowdsourcing Point of Sale Ben McDonald shares Personal Information Botnet Cortana Mobile Computing Travel 3D Printing eWaste G Suite Supercomputer CrashOverride Processors Machine Learning Staffing Virtualization Motion Sickness Unsupported Software Administrator Taxes Update IT Budget Web Server what was your? Computer Repair Relocation Smart Office

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3