Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call Pulse Technology Solutions today at 239-362-9902.

Outsource IT Maintenance to the Pros and Worry Les...
Virtualization Means Accessing Game-Changing Tools...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Backup Hackers Productivity Software IT Services Managed IT Services Business Outsourced IT Ransomware Microsoft Mobile Devices Windows 10 Email Computer IT Support Internet Business Continuity Social Media Productivity Managed IT User Tips Efficiency Google Remote Monitoring Smartphone Recovery Workplace Tips Data Backup Disaster Recovery Hosted Solutions Data Recovery Unified Threat Management Hardware Cloud Computing Data Android IT Support SaaS Managed IT Services Managed Service Provider Training Apps Innovation Save Money Work/Life Balance Data Management Communication App Office 365 Telephone Systems Collaboration Facebook Windows IT Service Risk Management How To Hosted Solution Smartphones Mobile Device Password Content Filtering File Sharing Big Data Internet of Things Firewall Paperless Office Robot Cybersecurity Phishing Word Websites Alert Tip of the week Browser BDR Botnet Virtual Reality Samsung Money Politics Wireless IT Management Hacker Vendor Management Computer Care Physical Security BYOD Automobile Mobile Device Management Files Going Green Twitter Data Storage Education Encryption Taxes Uninterrupted Power Supply Health Virtualization Small Business VoIP Windows 10 VoIP Mobility Social Unsupported Software Customer Relationship Management Sports Solid State Drive Microsoft Office Travel YouTube Holiday Wireless Technology Supercomputer Assessment Hard Disk Drive Virus Business Technology Heating/Cooling Downtime Outlook Motion Sickness Settings IT Budget Information Technology Consultation Error Licensing Sync Cortana Lenovo Servers Shortcut Meetings Digital Digital Payment Computers Mobile Data Cleaning Private Cloud Software Tips Mobile Device Managment Crowdsourcing WiFi Superfish Server Management Patch Management Webcam Spyware Telephony Legal USB Personal Information Quick Tips Public Cloud Update Maintenance Government GPS Statistics Vulnerability Point of Sale Employer-Employee Relationship Server Automation Notifications Staffing Google Drive Communications Chromebook History IBM Network Tracking Bluetooth VPN Web Server Tablet IT Solutions Wi-Fi Avoiding Downtime Cabling Corporate Profile Document Management Antivirus Virtual Private Network Cameras How To Apple Black Market Upgrades Computer Repair Artificial Intelligence Time Management Office Tips Infrastructure Hacking G Suite WannaCry Office Mail Merge CCTV Analytics Customer Service Bandwidth Disaster Upgrade Network Management Trending Monitors Law Enforcement Identity Theft Address Chrome Tech Support Help Desk Google Maps Remote Computing Touchscreen Administrator Emoji Data loss Gadget Redundancy IT Consultant Firefox Budget Processors Computing Electronic Medical Records Project Management Business Management Search Cybercrime Business Growth Emergency Cost Management CrashOverride Thank You Hacks Congratulations

Newsletter Sign Up