Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at Computerware.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to Computerware at (703) 821-8200.

3 Significant Ways Your Business Can Take Advantag...
When Juggling Business Responsibilities, You Can't...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Smartphones Small Business Gadgets Quick Tips Network Security Business Continuity User Tips Mobile Devices Mobile Office Computer Disaster Recovery Virtualization Network Microsoft Office Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Android Windows Unified Threat Management Smartphone Ransomware Passwords Innovation Holiday Operating System Remote Computing BYOD Remote Monitoring Communication Mobile Computing WiFi Vendor Management Marketing The Internet of Things Apps Facebook Collaboration Firewall Managed IT services Analytics History Users Data Management IT Support Alert Apple Cybersecurity Phishing Managed IT Services Outsourced IT IT Consultant Save Money Automation Gmail App Content Filtering Productivity Big data Bring Your Own Device Office Health Hard Drives Outlook Hiring/Firing Artificial Intelligence Virus Managed IT Browser Best Practice Going Green BDR Spam Windows 8 Wireless Technology communications Search Budget Tech Support Lithium-ion Battery Encryption Help Desk Antivirus Office 365 Money Maintenance Recovery Information Technology Phone System Employer-Employee Relationship IBM Mobile Device Cost Management Printer Update Internet of Things Bandwidth Data Backup Proactive IT It Management Save Time Networking Computers Hard Drive Administration Running Cable Law Enforcement Government Data storage Document Management Risk Management Legal Saving Time Humor SaaS Customer Service Travel Education Excel Comparison Hacking Business Growth PowerPoint Social Networking Telephone Systems VPN Twitter Mobility Training User Disaster End of Support Windows 10 iPhone DDoS Securty Business Intelligence Solid State Drive Word Flexibility Cortana Password Computer Repair Data Recovery Hacker Fax Server Intranet Tablet Two-factor Authentication Hosted Solution Wireless Robot Project Management Avoiding Downtime Website Digital Payment Black Market Current Events Customer Relationship Management User Error Experience eWaste Augmented Reality Public Cloud Mouse Telephony Monitors Gaming Console Text Messaging Webcam YouTube Settings Unified Communications Scam Automobile Safety Specifications Social How To Net Neutrality Digital Network Congestion Politics Start Menu Taxes Cybercrime Software as a Service Cryptocurrency Access Control Uninterrupted Power Supply Co-managed IT Google Docs Laptop Trending Data Security Bitcoin Downtime Lifestyle Processors Office Tips Statistics Patch Management USB Google Maps Paperless Office Presentation Company Culture Sports Virtual Desktop Streaming Media Cloud Computing Computing Hack Inbound Marketing Programming Documents Heating/Cooling IT service Chrome Social Engineering Compliance Router Pain Points Distributed Denial of Service Computing Infrastructure Retail Computer Accessories Google Drive Hard Drive Disposal Read Employer Employee Relationship Rental Service Deep Learning Shortcut Visible Light Communication Vulnerability Value Upselling Licensing Webinar Memory Botnet Wi-Fi Printing Troubleshooting Electricity Windows Server 2008 Unified Threat Management Staffing Environment Competition Advertising Business Technology GPS Flash Computer Malfunction Google Wallet Downloads Business Owner WannaCry Windows 7 Time Management Fiber-Optic Best Practives Displays Application Ebay 3D Motion Sickness Banking Drones Google Calendar Recycling Freedom of Information Microserver Touchscreen Fraud Tracking File Sharing Language Permissions Knowledge Digital Signature Pirating Information Adminstration Turn Key Web Server Business Metrics Technology Tips Entertainment News switches Websites email scam Workers Trojan Writing Content Management Tech Terms Organize Analytic Chromebook Access Fake News Vulnerabilities Samsung Messenger Work/Life Balance Public Speaking Video Surveillance Mobile Technology G Suite Saving ZTime Physical Security Download LinkedIn Spyware Microsoft Excel Entrepreneur IT consulting Business Cards Tablets Books Cleaning Archive HIPAA Debate Data Protection Mobile Payment Business Managemenet Sync CCTV Microchip Electronic Payment CIO cache Windows XP Point of Contact Harddrive Reading Regulations IP Address Society Data Loss Corporate Profile Television In Internet of Things Assessment Blockchain External Harddrive Thin CLient Emails Hacks Human Resources Micrsooft Redundancy Relocation Scalability Identity Theft Data Breach VoIP SharePoint Skype Consultation Tip of the week Smart Phones Leadership Meetings Get More Done Notifications Teamwork Cabling Printer Server Reliable Computing Private Cloud Administrator Virtual Reality Music Audit Storage Device Management Evernote Virtual Assistant Supercomputer Upgrades PDF Keyboard LiFi Emergency Best Available Worker Machine Learning Bluetooth Domains online Currency Computer Care Data Warehousing Product Reviews CrashOverride 3D Printing Piracy Software License Capital Productuvuty

hp supplies medallionLarge2017