Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call BNMC today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 22 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Email Technology Hackers Privacy Malware Internet Hosted Solutions Business Computing Computer Windows Google Windows 10 Microsoft Business Data Ransomware Innovation Software IT Services App Hardware Smartphone Productivity Business Continuity IT Support Internet of Things Data Management Saving Money Cloud Computing Data storage Small Business Settings Phishing Gmail Office Tips Big Data Mobile Devices Network Security Facebook Robot Google Drive Backup Efficiency Upgrade Managed IT Services Network Productivity Cybersecurity Money Chrome Server IT Support Hosted Solution Monitors Save Money Unified Threat Management Workplace Tips Managed IT Services YouTube Miscellaneous Social Media communications Outsourced IT Apple Browser Passwords Mobile Device Smartphones LiFi Managed Service Provider Administration Android Content Filtering Telephone Systems End of Support Analytics Risk Management Artificial Intelligence Virtual Desktop File Sharing Business Growth Password Solid State Drive Computers Laptop Deep Learning Microsoft Office Encryption Drones Employer-Employee Relationship Hacker Customer Relationship Management Hard Disk Drive Spam Display Bring Your Own Device Downtime Cabling Outlook Alt Codes Gadgets Remote Monitoring How To Budget Infrastructure Bandwidth Humor Typing Halloween Current Events Users IT Management Apps Automation Firefox Digital Payment Mouse Virtual Reality Disaster Education Cryptocurrency Scary Stories Going Green Quick Tips Maintenance Communication Website SaaS Uninterrupted Power Supply Storage Bitcoin Computer Care Sports Printing VoIP IBM Unified Communications Writing Wireless Legal Disaster Recovery Dark Data The Internet of Things Windows 8 Training Avoiding Downtime Corporate Profile Retail Automobile VoIP Dell WiFi Customer Service Cybercrime Computing Office 365 Marketing Time Management WannaCry Office Vendor Management Google Maps Operating System Social Information Technology Data loss Social Engineering Best Practice Alert desktop IT solutions Safety Politics Digital Firewall Google Docs Collaboration Hacks Word Network Congestion Running Cable Buisness Google Wallet Spyware Wi-Fi Notifications Virtualization Identity Theft Websites Computer Repair Travel Mobile Device Management Crowdsourcing User Tips G Suite How To Supercomputer Botnet CrashOverride Health Motion Sickness Mobile Computing Government Black Market Taxes IT Budget Machine Learning Electronic Medical Records IT Consultant BYOD Twitter Upgrades Relocation Meetings Cleaning Work/Life Balance Remote Computing 3D Printing Private Cloud Webcam Law Enforcement Unsupported Software Error Update Ben McDonald shares Point of Sale Gadget Mobile Data Recovery Paperless Office Staffing Administrator Processors Chromebook what was your? Web Server GPS Holiday Physical Security Business Management Emoji Cameras Tracking Personal Information Samsung Cortana CCTV Document Management Tech Support

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3