Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at Computerware.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to Computerware at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Business Computing Software Productivity Backup Hackers Saving Money Hardware Data Business Malware IT Support Hosted Solutions Email IT Services Quick Tips Smartphones Gadgets Google Efficiency Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Virtualization Microsoft Office Computer Network User Tips Miscellaneous Upgrade Social Media Network Security Server Windows 10 VoIP Mobile Device Management Windows Unified Threat Management Innovation BYOD Communication Operating System WiFi Remote Computing Passwords Smartphone Apps The Internet of Things Vendor Management Mobile Computing Ransomware Marketing Android Remote Monitoring Facebook Users History Holiday Managed IT services Firewall Alert Analytics Apple Collaboration Data Management IT Consultant Save Money Automation Content Filtering Big data Bring Your Own Device Office Health Phishing Hiring/Firing App Best Practice Spam Going Green Windows 8 Wireless Technology Tech Support Outsourced IT Lithium-ion Battery Hard Drives Virus Internet of Things Productivity Gmail Phone System Browser Employer-Employee Relationship Information Technology BDR IBM Printer Budget Search Outlook Proactive IT Money Administration Help Desk Maintenance Computers Running Cable Bandwidth Encryption Humor Saving Time Customer Service Data storage Education Managed IT Services Save Time PowerPoint Social Networking Office 365 SaaS Hosted Solution Antivirus User Twitter Artificial Intelligence Government Black Market iPhone Recovery Business Intelligence Telephone Systems Risk Management Training Networking Password Mobile Device Document Management Fax Server Hacker Computer Repair communications Tablet Intranet Managed IT Avoiding Downtime Two-factor Authentication Wireless Update Solid State Drive Website Travel Current Events Flexibility Legal Digital Payment IT Support Hard Drive Hacking Webcam Sports How To IT service Text Messaging VPN Robot Safety Social Taxes Network Congestion Uninterrupted Power Supply Compliance DDoS Net Neutrality Co-managed IT Cybercrime Word Business Growth Monitors Cortana Lifestyle Cost Management Settings Cloud Computing Downtime YouTube Processors Hack USB Statistics Presentation Politics Company Culture End of Support Virtual Desktop Law Enforcement Programming Streaming Media Documents Inbound Marketing Heating/Cooling Pain Points Public Cloud Cybersecurity User Error Chrome Excel Laptop Retail Router Experience Paperless Office Computer Accessories Comparison Gaming Console Office Tips Customer Relationship Management Automobile Computing Augmented Reality Tracking Best Practives Competition Identity Theft Mouse Society Notifications Micrsooft Windows 10 Business Owner Reliable Computing Cache Microserver Web Server GPS Workers Application Virtual Reality Social Engineering Start Menu Specifications Scalability Bluetooth Vendor Mangement Ebay Turn Key 3D Music Samsung Trojan Digital Signature Computing Infrastructure Recycling Rental Service Upgrades Organize G Suite Entertainment Memory Business Mangement Pirating Information LiFi Physical Security Adminstration Tablets Wi-Fi Telephony Analytic Deep Learning Data Protection Sync Content Management Flash IT Management Visible Light Communication CCTV Google Maps Public Speaking Corporate Profile In Internet of Things Entrepreneur Google Drive Video Surveillance Advertising Emails Trending Harddrive Google Wallet Saving ZTime HIPAA LinkedIn Banking Business Managemenet File Sharing Displays VoIP Electronic Payment Archive Language Debate External Harddrive Unified Communications Meetings Drones Cabling Disaster IP Address Private Cloud Business Metrics Point of Contact Electricity Human Resources Administrator Supercomputer Get More Done Smart Phones Permissions Worker Thin CLient Printer Server Securty Machine Learning Chromebook Skype Messenger Writing WannaCry switches Distributed Denial of Service Employer Employee Relationship Teamwork Work/Life Balance Licensing Leadership Storage Download PDF Books Digital Botnet Keyboard Best Available Device Management Cryptocurrency Product Reviews Upselling Google Docs Webinar Domains Microchip eWaste Reading Read Regulations Access IT consulting Computer Malfunction Mobility Shortcut Value online Currency Cleaning CIO Troubleshooting Hacks Environment Relocation Spyware Windows XP Staffing Motion Sickness

hp supplies medallionLarge2017