Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

Encryption is a smart way to secure a file. Essentially, should someone access an encrypted file, all they’ll see is a bunch of random numbers, letters, and special characters.

Now, once a file is encrypted, that doesn’t mean that it’s encrypted for good. If you’re the one who encrypts the file, then you’ll have access to a decryption key which can be used to piece together the file and make it readable again, sort of like putting together a jigsaw puzzle that’s scattered on the floor.

You may have heard about encryption in the news lately in relation to major ransomware attacks like WannaCry. In the case of ransomware, hackers encrypt files against a user's will, and they alone hold the decryption key, which they’ll provide for a hefty price. While encrypting sensitive files on your PC isn’t quite the same as how hackers use encryption for ransomware, the effectiveness of ransomware does speak to how good encryption is at keeping unwanted users from accessing sensitive information.

That said, you wouldn’t want to encrypt data this way in a shared environment. If you encrypt the data, other users won’t be able to get into it. For situations like this, there is software your organization can use to standardize your file encryption.

To get started with encrypting files or a folder in Windows, locate the data you want to encrypt and follow these steps:

Select the file or folder and then right-click it and go to Properties.

A new window will open. Click on the General tab and then find and click the Advanced button.

ib 1 encryption

You will next check the box that reads “Encrypt contents to secure data.” With this box selected, go ahead click Apply and then OK.

ib 2 encryption

Depending on if you’re encrypting a single file or a folder containing files, you may see a new window asking you to confirm how much data you wish to encrypt. Select the desired button and then click OK.

ib 3 encryption

You’ll now see that your file is encrypted, as indicated by the padlock seen on your file’s icon.

With your data encrypted, you can feel better about the security of your files. Of course, file encryption isn’t an impenetrable security plan, so you shouldn’t fully rely on it. Instead, we recommend that a security measure like encryption be one part of a comprehensive security plan.

For additional assistance protecting your sensitive data from those who don’t need to see it, call Pulse Technology Solutions today at 239-362-9902.

Outsource IT Maintenance to the Pros and Worry Les...
Virtualization Means Accessing Game-Changing Tools...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 23 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Privacy Malware Network Security Hackers Backup Productivity Microsoft IT Services Managed IT Services Software Ransomware User Tips Outsourced IT Business Email Business Continuity Mobile Devices Windows 10 Computer IT Support Internet Google Smartphone Android Social Media Productivity Managed IT Efficiency Remote Monitoring Hardware Data Management Data Recovery Recovery Disaster Recovery Workplace Tips IT Support Unified Threat Management Hosted Solutions Data Backup Office 365 App Data Cybersecurity Training Cloud Computing Save Money Tip of the week SaaS Managed Service Provider Work/Life Balance Apps Innovation Managed IT Services Communication Hosted Solution Smartphones Small Business Browser Facebook Phishing Risk Management Content Filtering Word How To File Sharing Windows Big Data Password Firewall Mobile Device Collaboration Telephone Systems Internet of Things Paperless Office IT Service Robot Virtual Private Network Politics Hacker Computer Care Uninterrupted Power Supply Virtual Reality Money Windows 10 BYOD VoIP Mobility Automobile Wireless Mobile Device Management Files Vendor Management Twitter Physical Security Encryption Data Storage Taxes IT Management Virtualization VoIP Artificial Intelligence Maintenance Websites Alert Going Green Education Botnet Samsung BDR Health Antivirus Error How To Apple Printer Information Technology Sync Time Management Infrastructure Computers Electronic Medical Records Networking Meetings Hacking WannaCry Computing Private Cloud Analytics Customer Service Access Control Cleaning Mail Merge Unsupported Software Mobile Device Managment Network Management Crowdsourcing Disaster Sports Social USB Identity Theft Data Security Webcam Trending Telephony Monitors Address Public Cloud Chrome Google Maps Wireless Technology SharePoint Touchscreen Government Data loss Automation Techology Point of Sale Redundancy Communications Firefox Notifications Staffing Cortana Web Server Search Customer Relationship Management Mobile Data Solid State Drive YouTube Black Market Supercomputer Cameras Microsoft Office Office Tips Assessment Legal Personal Information Project Management G Suite Heating/Cooling Hard Disk Drive Update Settings IT Budget CCTV Outlook Consultation Licensing Servers Law Enforcement Chromebook Tech Support Digital Remote Computing Digital Payment Network Shortcut Administrator Software Tips IT Solutions WiFi Wi-Fi Business Technology Server Management Gadget Budget Spyware Processors IT Consultant Patch Management Business Management Quick Tips Upgrades Business Growth GPS Computer Repair Lenovo Cybercrime Statistics Employer-Employee Relationship Server Unified Threat Management Office Vulnerability Google Drive History Bandwidth Tracking Upgrade Superfish Travel Bluetooth Holiday IBM Tablet User Error VPN Downtime Avoiding Downtime Virus Cabling Help Desk Document Management Scam Motion Sickness Corporate Profile Emoji Downloads Disaster Resistance Two-factor Authentication Proactive IT Hacks Multi-Factor Security Cost Management IT Consulting Emergency Data Breach Technology Laws Thank You Congratulations CrashOverride

Newsletter Sign Up