Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 26 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Cloud Best Practices Technology Email Privacy Malware Hackers Hosted Solutions Business Computing Internet Software Microsoft Computer Windows Google Ransomware Windows 10 IT Services Backup Business Business Continuity Innovation Network Security App Hardware Smartphone Data Internet of Things Mobile Devices IT Support Saving Money Data Management Cloud Computing Productivity Phishing Remote Monitoring Gmail Office Tips Big Data Smartphones Facebook Android Efficiency Robot Word Data Recovery Google Drive Upgrade Small Business Managed IT Services Settings Data storage Outlook Managed IT Services Vulnerability Monitors Social Media communications Save Money Outsourced IT IT Management Disaster Recovery Miscellaneous Browser Passwords Apple SaaS Mobile Device LiFi Managed Service Provider Office 365 Administration Content Filtering Analytics Telephone Systems Risk Management Alert Artificial Intelligence End of Support Network Encryption Productivity Cybersecurity Windows 10 Chrome Server Hosted Solution Tip of the week Microsoft Office IT Support Workplace Tips User Tips YouTube Unified Threat Management Money Alt Codes Education Digital Payment Scary Stories Firefox Disaster Servers Website Budget Humor Typing Maintenance VPN Sports Automation Current Events Unified Communications Uninterrupted Power Supply Server Management Mouse Cryptocurrency IBM Virtual Private Network Virtual Reality Computer Care The Internet of Things Wireless Quick Tips Communication Going Green Statistics VoIP Storage Bitcoin Corporate Profile Mail Merge WiFi Training Cybercrime VoIP Writing Automobile Marketing Printing Dell Bluetooth Legal Dark Data Windows 8 WannaCry Address Google Maps Avoiding Downtime Retail Antivirus Customer Service Data loss Data Backup IT solutions Time Management Office Computing desktop Search Vendor Management Operating System Running Cable Politics Social Digital Emergency Firewall Network Management Buisness Social Engineering Collaboration Information Technology Best Practice Virtual Desktop Samsung Laptop Spyware Business Technology Deep Learning Touchscreen Safety File Sharing Solid State Drive Managed IT Google Docs Network Congestion Websites Hacks Employer-Employee Relationship Lenovo Spam Bring Your Own Device Downtime Google Wallet Business Growth Hard Disk Drive Shortcut Computers Gadgets Password Superfish Cabling Drones Hacker Patch Management Bandwidth Customer Relationship Management Halloween Display Users How To Scam Apps Infrastructure Heating/Cooling BYOD Health IT Consultant Black Market Relocation Mobile Computing Networking Meetings Work/Life Balance Electronic Medical Records Cleaning Twitter Private Cloud Upgrades Webcam Law Enforcement Remote Computing Error Ben McDonald shares 3D Printing Point of Sale Gadget Unsupported Software Paperless Office Update Staffing Administrator what was your? Mobile Data Web Server Processors Holiday Recovery GPS Business Management Cameras Chromebook Tracking Physical Security CCTV Tech Support Emoji Document Management Personal Information Notifications Identity Theft Cortana Travel Crowdsourcing Wi-Fi G Suite Supercomputer Botnet CrashOverride Virtualization Motion Sickness Government Computer Repair Taxes IT Budget Machine Learning Mobile Device Management How To

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3