Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at Computerware.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to Computerware at (703) 821-8200.

3 Significant Ways Your Business Can Take Advantag...
When Juggling Business Responsibilities, You Can't...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Disaster Recovery Computer Virtualization Mobile Office Network Microsoft Office VoIP Social Media Server Smartphone Mobile Device Management Android Windows 10 Miscellaneous Innovation Upgrade Ransomware Unified Threat Management Windows Remote Monitoring Passwords Holiday Operating System Remote Computing Mobile Computing WiFi Vendor Management Collaboration BYOD Communication Apps The Internet of Things Marketing Facebook Users Analytics Managed IT services Firewall History Apple Cybersecurity Productivity Data Management IT Support communications Alert Outsourced IT Phishing Internet of Things Save Money IT Consultant Managed IT Services Content Filtering BDR Spam Health Bring Your Own Device Office Automation Gmail App Big data Tech Support Information Technology Best Practice Going Green Mobile Device Managed IT Wireless Technology Data Recovery Search Outlook Hiring/Firing Maintenance Lithium-ion Battery Virus Data Backup Browser Bandwidth Hard Drives Antivirus Windows 8 Artificial Intelligence Budget Printer IBM Hacking Office 365 Money Update Recovery Employer-Employee Relationship Phone System Help Desk Cost Management Encryption Website Travel Law Enforcement Education Document Management Data storage Saving Time Save Time Intranet Legal Cloud Computing Running Cable Administration SaaS Government Cybercrime Proactive IT Risk Management Computers It Management VPN Hard Drive Networking Training Two-factor Authentication Customer Service Humor Windows 10 Business Intelligence Disaster Wireless End of Support Securty Avoiding Downtime Solid State Drive Computer Repair Access Control Current Events Flexibility Excel Laptop Data Security Data Loss User Data Breach Digital Payment DDoS Project Management Hosted Solution Robot Comparison Social Engineering Word Compliance Augmented Reality PowerPoint Black Market Social Networking Cortana Password Hacker Business Growth Downtime Twitter Fax Server Mobility Tablet Company Culture Telephone Systems iPhone Programming How To Documents Heating/Cooling Digital Vulnerabilities Mobile Technology Websites Start Menu Tech Terms Politics Taxes Tech Term Trending Software as a Service Retail Uninterrupted Power Supply Bitcoin Experience Pain Points eWaste Value Statistics User Error Cryptocurrency Data Protection Google Docs Blockchain Patch Management Google Maps Cleaning Office Tips Streaming Media Gaming Console Inbound Marketing Regulations Emails Safety Webcam Redundancy Paperless Office Specifications Social Hack Sports Computing Chrome Network Congestion Private Cloud Identity Theft Router IT service Computer Accessories Customer Relationship Management Virtual Reality Distributed Denial of Service Bluetooth Mouse Public Cloud Computing Infrastructure Co-managed IT Text Messaging Processors Business Technology Telephony Monitors USB Presentation Lifestyle Automobile Scam Virtual Desktop YouTube Settings Net Neutrality Unified Communications Drones Wireless Headphones Fake News Knowledge Banking Technology Tips File Sharing Teamwork Content Management Web Server Smart Phones Language Storage Get More Done Workers Permissions Device security Microsoft Excel Business Metrics PDF Printer Server Keyboard Access Writing Best Available switches Business Cards Video Surveillance Mobile Payment Saving ZTime Domains LinkedIn Samsung Product Reviews Read G Suite Chromebook Messenger Shortcut Spyware Archive Physical Security Piracy Debate HTML Television Work/Life Balance Troubleshooting Tablets Webinar Point of Contact Sync Staffing Upselling Download Environment Books Competition cache CCTV IT consulting Software License Devices SharePoint Thin CLient Business Owner Corporate Profile In Internet of Things CIO Tip of the week Microchip Reading Application Assessment Windows XP IT Plan Accountants Scalability Evernote Leadership Best Practives Society VoIP Micrsooft Virtual Assistant Hacks Relocation Microserver Consultation Digital Signature Meetings Migration Device Management Equifax Data Warehousing Entertainment Cabling Notifications Administrator Hard Drive Disposal Audit Reliable Computing Turn Key online Currency Supercomputer Desktop Music Analytic Startup Machine Learning Windows Server 2008 Emergency Trojan Worker Organize Upgrades Unified Threat Management Computer Care Public Speaking Google Drive Employer Employee Relationship LiFi Applications Smart Tech Windows 7 Vulnerability Licensing Rental Service Entrepreneur Electricity Deep Learning Botnet Fiber-Optic GPS Printing Memory HIPAA Visible Light Communication Business Managemenet Mobile Security Multi-Factor Security Freedom of Information Wi-Fi Electronic Payment Downloads WannaCry Computer Malfunction Fraud Ebay 3D IP Address Time Management Flash Advertising UTM Recycling Google Wallet Legislation News Human Resources Harddrive Google Calendar Displays Motion Sickness email scam Pirating Information Adminstration External Harddrive Touchscreen Tracking Skype Multi-factor Authentication Nanotechnology 3D Printing Capital Productuvuty CrashOverride

toner1.7