Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at Computerware.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to Computerware at (703) 821-8200.

3 Significant Ways Your Business Can Take Advantag...
When Juggling Business Responsibilities, You Can't...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Business Computing Productivity Hackers Backup Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Small Business Gadgets Smartphones Business Continuity Mobile Devices Mobile Office Computer Disaster Recovery User Tips Network Security Virtualization Network Microsoft Office Server VoIP Miscellaneous Upgrade Social Media Windows 10 Mobile Device Management Windows Unified Threat Management Smartphone Android Ransomware Operating System Remote Computing Passwords Innovation BYOD Communication WiFi Vendor Management Remote Monitoring The Internet of Things Apps Holiday Mobile Computing Marketing Managed IT services History Facebook Users Collaboration Firewall Analytics Data Management Apple IT Consultant Save Money Alert Outsourced IT IT Support Content Filtering Productivity Bring Your Own Device Phishing Office Automation Health Big data Managed IT Services Best Practice App BDR Spam Going Green Wireless Technology Hiring/Firing Windows 8 Search Browser Tech Support Lithium-ion Battery Hard Drives communications Outlook Budget Artificial Intelligence Managed IT Virus Information Technology IBM Phone System Internet of Things Gmail Update Printer Recovery Employer-Employee Relationship Encryption Data Backup Help Desk Antivirus Cybersecurity Maintenance Data storage Document Management Mobile Device Legal Save Time Money Saving Time SaaS Running Cable Humor Bandwidth Government Proactive IT Computers Customer Service It Management Administration Law Enforcement Travel Education Business Intelligence Flexibility Windows 10 Hacking Computer Repair Office 365 User Fax Server Intranet Data Recovery Hosted Solution DDoS Avoiding Downtime Digital Payment Word Black Market Risk Management Password Cost Management Hacker Networking Current Events PowerPoint Telephone Systems Social Networking Tablet Training VPN Disaster Twitter Two-factor Authentication Wireless Hard Drive Securty Mobility Website Solid State Drive iPhone Retail Experience How To Laptop Google Docs Start Menu Trending Co-managed IT Taxes Office Tips Software as a Service Access Control Uninterrupted Power Supply Paperless Office Statistics Sports Safety Computing Lifestyle Social Robot Streaming Media Google Maps IT service Inbound Marketing Network Congestion Patch Management Compliance Cloud Computing Chrome Cybercrime Hack Router Cortana Computer Accessories Project Management Pain Points Comparison Business Growth Customer Relationship Management Monitors Augmented Reality Telephony Excel Processors User Error Downtime USB Text Messaging Presentation YouTube Settings Public Cloud Unified Communications Company Culture Gaming Console Virtual Desktop End of Support Webcam Documents Programming Heating/Cooling Politics Scam Net Neutrality Automobile Best Available Google Calendar Chromebook Motion Sickness Keyboard Turn Key Tracking Content Management Domains Product Reviews Touchscreen Messenger Knowledge Work/Life Balance Trojan eWaste Cryptocurrency Read Value Technology Tips Digital Download Organize Web Server Shortcut Workers Video Surveillance Troubleshooting IT consulting Websites Books Tech Terms LinkedIn Staffing Environment Cleaning Saving ZTime CIO Access Microchip Competition Reading Samsung Archive Regulations Debate Business Owner Windows XP G Suite Society Micrsooft Spyware Hacks Physical Security Point of Contact Application Relocation Tablets Specifications Data Security Harddrive Data Protection Identity Theft Sync Thin CLient Digital Signature cache Notifications CCTV Reliable Computing External Harddrive Entertainment Data Loss Corporate Profile Virtual Reality In Internet of Things Music Leadership Upgrades Assessment Social Engineering Emails Smart Phones Bluetooth Get More Done Scalability Device Management LiFi Analytic Redundancy Data Breach VoIP Computing Infrastructure Printer Server Public Speaking Deep Learning Consultation Rental Service Meetings Cabling online Currency Memory Private Cloud Visible Light Communication Audit Wi-Fi Administrator Entrepreneur HIPAA Business Managemenet Supercomputer Worker Flash Machine Learning Mouse Electronic Payment Advertising Emergency Computer Care Upselling Webinar Distributed Denial of Service Google Wallet IP Address Displays Mobile Technology GPS Google Drive Employer Employee Relationship Licensing Human Resources Printing Electricity Banking Botnet Drones Ebay Mobile Payment 3D Skype File Sharing Business Technology Language Best Practives Recycling Permissions Teamwork Downloads WannaCry Business Metrics Computer Malfunction Writing Pirating Information Storage switches Adminstration Time Management Microserver PDF CrashOverride 3D Printing Capital Productuvuty Vulnerability Television

hp supplies medallionLarge2017