Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call BNMC today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 18 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Internet Business Computing Microsoft Hosted Solutions Ransomware Software Android IT Services Business Windows Google Network Security Computer Smartphone Small Business Windows 10 Backup Mobile Devices Business Continuity Browser Innovation Data Management Internet of Things Data App Hardware Outsourced IT Encryption Productivity Tip of the week Phishing Office 365 Remote Monitoring IT Support Smartphones Cloud Computing Managed IT Services Saving Money Data Recovery User Tips Artificial Intelligence Windows 10 Settings Vulnerability Gmail Office Tips Word Robot Big Data Google Drive Productivity Upgrade Facebook Managed Service Provider Cybersecurity IT Support Efficiency Risk Management Data storage Money Save Money Automation Mouse Chrome Miscellaneous Two-factor Authentication Hosted Solution Server Apple Scam Mobile Device Bandwidth SaaS Workplace Tips YouTube Social Media communications Holiday Business Management Telephone Systems IT Management Alert Computing Virtual Private Network Disaster Recovery Firewall Passwords End of Support Employer-Employee Relationship LiFi Antivirus Administration Data Backup Content Filtering Government Microsoft Office Analytics Unified Threat Management Managed IT Services Outlook Maintenance Network Monitors Budget Language Lenovo Deep Learning Uninterrupted Power Supply Humor Typing Downloads Current Events Distributed Denial of Service IBM Shortcut Computer Care Spam Downtime Computing Infrastructure Superfish Wireless Bring Your Own Device Virtual Reality Cryptocurrency Gadgets Going Green Managed IT Service Corporate Profile Patch Management Training Communication Automobile Alerts Customer Relationship Management Dell Heating/Cooling Storage Bitcoin Multi-Factor Security Users Printing Break Fix WannaCry Apps Halloween Writing Legal Networking Google Maps Servers Education Dark Data Windows 8 Google Calendar Dark Web Data loss VPN Scary Stories Retail Website Data Security desktop Server Management Customer Service Legislation Microsoft Excel Digital Unified Communications Politics Sports Office Collaboration Vendor Management Operating System Techology Quick Tips Tablet Statistics Samsung The Internet of Things Social Information Technology Blockchain Spyware Mail Merge Social Engineering VoIP File Sharing VoIP Best Practice Unified Threat Management Comparison Solid State Drive Bluetooth WiFi Cybercrime Safety Marketing Permissions Address Websites Avoiding Downtime Google Docs User Error Hacks Specifications Hard Disk Drive Network Congestion Google Wallet Fraud Time Management Wi-Fi Business Growth Printer Cabling Password Black Friday Search IT solutions Computers Drones Mobile Security How To Emergency Network Management Hacker Access Control Infrastructure Cyber Monday BYOD Running Cable Display Hotspot Firefox Business Technology Digital Payment Buisness Touchscreen Virtual Desktop Alt Codes SharePoint Disaster Smart Technology Managed IT Laptop Private Cloud Webcam Electronic Medical Records Twitter Law Enforcement Error Upgrades Ben McDonald shares Point of Sale Remote Computing Gadget 3D Printing Paperless Office Staffing Administrator Unsupported Software Licensing what was your? Web Server Update Processors GPS Mobile Data Cameras Recovery Tracking CCTV Chromebook Document Management Tech Support Physical Security Emoji Notifications Identity Theft Travel Personal Information G Suite Cortana Crowdsourcing CrashOverride Supercomputer Botnet Motion Sickness Taxes Virtualization IT Budget Machine Learning Computer Repair Mobile Device Management IT Consultant How To Relocation Meetings Health Mobile Computing Cleaning Black Market Work/Life Balance

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3