Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Computing Microsoft Hosted Solutions Ransomware Internet Software Computer IT Services Network Security Windows Google Windows 10 Backup Business Smartphone Data Business Continuity Innovation Android App Hardware Small Business Data Management Phishing Managed IT Services Cloud Computing User Tips Browser Internet of Things Saving Money Mobile Devices IT Support Tip of the week Productivity Remote Monitoring Upgrade Word Data storage Gmail Office Tips Productivity Cybersecurity Big Data Smartphones IT Support Facebook Data Recovery Efficiency Outsourced IT Risk Management Artificial Intelligence Office 365 Robot Google Drive Settings Telephone Systems Workplace Tips Alert IT Management YouTube Virtual Private Network Social Media communications Microsoft Office Employer-Employee Relationship Disaster Recovery Money Outlook Passwords Monitors Save Money Antivirus LiFi Mouse Managed Service Provider Unified Threat Management Miscellaneous Administration Managed IT Services Content Filtering Apple SaaS Maintenance Analytics Windows 10 Network Mobile Device Computing Encryption Vulnerability Chrome End of Support Hosted Solution Server Google Calendar Safety Servers VPN Google Docs Bandwidth desktop Politics Data Security Network Congestion Apps Hacks Digital Halloween Users Firewall Collaboration Legislation Server Management Google Wallet Education Business Growth Samsung Techology Computers Quick Tips Password Spyware Scary Stories Website File Sharing Tablet Statistics Drones Mail Merge Hacker Solid State Drive Websites Unified Threat Management Display Unified Communications VoIP Sports Bluetooth Address Alt Codes Hard Disk Drive The Internet of Things User Error Avoiding Downtime Budget Cabling VoIP Government Data Backup Humor WiFi Typing Cybercrime Marketing Printer Automation Time Management Current Events How To Search Infrastructure BYOD Virtual Reality Emergency Cryptocurrency Digital Payment Access Control Communication Network Management Going Green Firefox Disaster Business Technology Storage IT solutions Bitcoin SharePoint Writing Touchscreen Printing Managed IT Legal Uninterrupted Power Supply Lenovo Dark Data Windows 8 IBM Running Cable Computer Care Wireless Downloads Retail Buisness Shortcut Virtual Desktop Superfish Customer Service Corporate Profile Laptop Training Automobile Two-factor Authentication Office Deep Learning Patch Management Operating System Dell Vendor Management Scam Spam Customer Relationship Management Social WannaCry Google Maps Multi-Factor Security Social Engineering Bring Your Own Device Heating/Cooling Information Technology Downtime Best Practice Networking Data loss Gadgets Business Management Cameras Personal Information Cortana Tracking CCTV Wi-Fi Tech Support Virtualization Document Management Notifications Computer Repair Identity Theft Mobile Device Management Travel Comparison How To Crowdsourcing Health G Suite Supercomputer Botnet Black Market Mobile Computing CrashOverride Motion Sickness Specifications Electronic Medical Records Taxes IT Budget Machine Learning Twitter Black Friday Upgrades IT Consultant Relocation Remote Computing Meetings Cyber Monday 3D Printing Work/Life Balance Cleaning Private Cloud Webcam Unsupported Software Law Enforcement Update Error Ben McDonald shares Point of Sale Mobile Data Gadget Recovery Paperless Office Chromebook Staffing Administrator what was your? Web Server Processors Physical Security Holiday Emoji GPS

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3