Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at Computerware.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to Computerware at (703) 821-8200.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Business Computing Backup Hackers Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Efficiency Google Quick Tips Gadgets Smartphones Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Computer User Tips Virtualization Microsoft Office Server Network Network Security Windows 10 Miscellaneous Upgrade VoIP Social Media Windows Unified Threat Management Mobile Device Management Operating System Smartphone Innovation Communication Remote Computing WiFi Ransomware Vendor Management Passwords Android BYOD Apps Mobile Computing Marketing The Internet of Things History Holiday Facebook Users Firewall Remote Monitoring Managed IT services Analytics Apple Collaboration Data Management IT Consultant Save Money Alert Bring Your Own Device Big data Office Managed IT Services Health Outsourced IT Content Filtering Automation Wireless Technology Search Windows 8 Lithium-ion Battery Tech Support Productivity Hard Drives Outlook Hiring/Firing Phishing Best Practice Virus Spam Going Green BDR App Phone System Employer-Employee Relationship IT Support Budget Printer Internet of Things Encryption Help Desk Antivirus Information Technology Gmail IBM Data Backup Managed IT Recovery Browser Saving Time communications SaaS Humor Customer Service Bandwidth Education Proactive IT Computers Save Time Artificial Intelligence Money Administration Maintenance Running Cable Data storage Computer Repair Word Risk Management Password It Management Legal Hard Drive Intranet Hacker Fax Server Update Tablet Hosted Solution Windows 10 Digital Payment Two-factor Authentication Wireless Avoiding Downtime Website Travel Black Market PowerPoint Social Networking Current Events Data Recovery VPN Networking Twitter Hacking Telephone Systems Training Office 365 iPhone User Business Intelligence Securty DDoS Solid State Drive Mobile Device Document Management Government Flexibility Cybercrime Public Cloud Laptop Statistics Co-managed IT Cortana Cybersecurity Cost Management Office Tips Lifestyle Streaming Media Processors Paperless Office Downtime Mobility Inbound Marketing USB Automobile Sports Presentation Computing Company Culture Robot How To Chrome Virtual Desktop IT service Router Documents Programming Heating/Cooling Start Menu Compliance Computer Accessories Comparison Customer Relationship Management Taxes Augmented Reality Pain Points Uninterrupted Power Supply Retail Business Growth User Error Experience Text Messaging Excel Telephony Monitors Gaming Console YouTube Settings Webcam Cloud Computing Disaster End of Support Hack Net Neutrality Safety Law Enforcement Social Politics Network Congestion Trending Google Drive Work/Life Balance Analytic Employer Employee Relationship Cryptocurrency Licensing Google Docs Archive Debate Download Public Speaking Books Electricity Botnet IT consulting Point of Contact Cleaning Microchip CIO Entrepreneur Business Technology Reading Thin CLient HIPAA WannaCry Regulations Business Managemenet Computer Malfunction Windows XP Society Electronic Payment Time Management Hacks Harddrive Micrsooft Scam IP Address Relocation Leadership Motion Sickness Human Resources Touchscreen Identity Theft External Harddrive Tracking Notifications Device Management Knowledge Reliable Computing Digital Skype Web Server Music Get More Done Websites Virtual Reality Smart Phones Workers Tech Terms Social Engineering Teamwork Upgrades Printer Server online Currency Storage Access Bluetooth LiFi Samsung PDF Software as a Service Computing Infrastructure Mouse Keyboard Rental Service Best Available Deep Learning G Suite Domains Spyware Memory Product Reviews Physical Security Visible Light Communication GPS Read Tablets eWaste Wi-Fi Shortcut Upselling Value Data Protection Webinar Sync Troubleshooting cache Flash CCTV Advertising 3D Google Maps Google Wallet Staffing Ebay Environment Patch Management Recycling Competition Corporate Profile Displays In Internet of Things Business Owner Assessment Emails Unified Communications Adminstration Drones Best Practives Scalability Pirating Information Redundancy Banking Application File Sharing VoIP Specifications Consultation Language Microserver Meetings Permissions Cabling Private Cloud Content Management Project Management Business Metrics Digital Signature Writing Administrator switches Entertainment Turn Key Supercomputer Worker Trojan Machine Learning Video Surveillance Emergency Chromebook Messenger Saving ZTime Organize Distributed Denial of Service LinkedIn Vulnerability 3D Printing CrashOverride Capital Productuvuty

hp supplies medallionLarge2017