Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call Pulse Technology Solutions today at 239-362-9902.

Outsource IT Maintenance to the Pros and Worry Les...
Virtualization Means Accessing Game-Changing Tools...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 25 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Business Computing Best Practices Malware Productivity Hackers Managed IT Services Privacy Network Security IT Services Business Backup IT Support Outsourced IT Internet Software Microsoft Windows 10 Computer Ransomware Email Social Media Mobile Devices Efficiency Unified Threat Management Hardware Google Business Continuity Productivity Recovery Workplace Tips Apps Innovation Work/Life Balance Hosted Solutions Communication Remote Monitoring App Smartphone Training Managed Service Provider User Tips Disaster Recovery Save Money Password Managed IT Big Data Firewall Data Management Internet of Things Office 365 Paperless Office Collaboration Telephone Systems Robot Cybersecurity IT Service Hosted Solution Cloud Computing Android Data Facebook How To Risk Management IT Support SaaS Content Filtering Managed IT Services Mobile Device File Sharing Twitter Data Storage Taxes Virtualization Going Green VoIP Education Alert Uninterrupted Power Supply Health Botnet Phishing Small Business BDR VoIP Smartphones Browser Politics Windows Virtual Reality Money Hacker Computer Care Wireless IT Management BYOD Automobile Data Backup Vendor Management Physical Security Mobile Device Management Black Market Server Cameras Files Employer-Employee Relationship Office Tips Google Drive History Chromebook G Suite IBM Tracking Network Tablet IT Solutions CCTV Encryption Avoiding Downtime Cabling Wi-Fi Law Enforcement Corporate Profile Document Management Remote Computing Apple Upgrades Tech Support How To Administrator Time Management Infrastructure Computer Repair Artificial Intelligence Office Gadget WannaCry Processors Customer Service Bandwidth IT Consultant Budget Analytics Business Management Network Management Disaster Upgrade Cybercrime Monitors Business Growth Identity Theft Google Maps Help Desk Websites Chrome Emoji Travel Holiday Data loss Firefox Samsung Downtime Virus Word Computing Electronic Medical Records Mobility Motion Sickness Error Customer Relationship Management Sports Social Unsupported Software Information Technology Sync Solid State Drive Computers Supercomputer Wireless Technology Meetings YouTube Private Cloud Assessment Cleaning Mobile Device Managment Crowdsourcing Hard Disk Drive USB IT Budget Webcam Telephony Settings Public Cloud Consultation Licensing Government Cortana Automation Digital Payment Point of Sale Digital Communications Notifications Software Tips Mobile Data Staffing WiFi Legal Web Server Spyware Quick Tips Update Personal Information Maintenance GPS Hacks CrashOverride Thank You Congratulations Touchscreen Windows 10 Tip of the week Cost Management

Newsletter Sign Up