ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at ClearView IT.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Remote Work Internet of Things Saving Money Operating System Government Networking Artificial Intelligence Windows Managed IT services Gadgets Workplace Strategy Encryption App Virtualization WiFi Business Technology Blockchain Spam Mobile Device Management Server Remote Bandwidth Information Employee/Employer Relationship Information Technology Gmail Office Two-factor Authentication Office 365 Budget History Apple Health Analytics BDR Big Data Wi-Fi Conferencing Access Control Cybercrime Data Security Patch Management Compliance Vendor Remote Monitoring Document Management Remote Computing Voice over Internet Protocol Help Desk Hacking Save Money IT Management Training Hacker Employer-Employee Relationship Cost Management Retail Augmented Reality Word Alert Applications IBM Legal Hiring/Firing Project Management Website Vulnerabilities Data storage Outlook Password Mobile Office Managed Services Data loss BYOD Money Computing Search... Vendor Management Customer Service Unified Threat Management Hard Drive Best Practice Firewall iPhone Cortana Paperless Office Education Antivirus Law Enforcement End of Support Content Filtering Printer Maintenance Windows 11 User Router Monitoring Remote Workers Healthcare Websites The Internet of Things Travel YouTube Virtual Reality Windows 7 Meetings Chrome Mobility Social Engineering Free Resource Cryptocurrency Black Market Laptop Google Maps Cleaning How To Scam Mobile Computing Robot VPN Marketing Running Cable Social Sports Update DDoS SaaS Storage Twitter Data Breach How To Processor Cooperation Microchip Video Conferencing Lithium-ion battery Flexibility Physical Security Virtual Machines HIPAA Computer Repair Processors Hack Identity Theft Professional Services Notifications Multi-factor Authentication Start Menu Unified Communications Computer Care Downloads Google Docs Managed Services Provider Vulnerability Saving Time Bluetooth Distributed Denial of Service Virtual Private Network Software as a Service Office Tips Bitcoin Private Cloud Memory Data Protection Computers Wireless Technology eWaste Current Events Telephone PowerPoint Administration Solutions Politics Downtime Presentation Safety Excel Specifications Machine Learning Settings Integration IT Consultant Images 101 Display Solid State Drive Tech Terms Virtual Desktop Experience Customer Relationship Management Co-Managed IT Managed IT Virtual Assistant Entertainment Employees Digital Chromebook Avoiding Downtime Drones Taxes Automobile Holidays Disaster Relocation Virtual Machine Health IT Displays Equifax Advertising Tech Support Hard Drive Disposal Reviews Optimization Audit Work/Life Balance Smart Technology Spyware Tactics Teamwork Username Recovery File Sharing Competition 2FA Troubleshooting Data Storage Hypervisor Redundancy Startup Freedom of Information email scam Entrepreneur Shopping In Internet of Things Navigation LiFi Medical IT Cache Addiction Hacks SQL Server Unified Threat Management Documents Network Congestion Workers Mobile Security Application Paperless Business Intelligence PCI DSS Reliable Computing Licensing User Tip Writing Legislation News Network Management CCTV Gig Economy Humor Printing Evernote Supply Chain Internet Service Provider Azure Touchscreen Securty Business Communications Computer Malfunction Fake News Business Owner Regulations Compliance Scalability Managed IT Service Emergency Proxy Server Emails Domains Text Messaging Workplace Vendor Mangement Service Level Agreement Proactive IT Computing Infrastructure Administrator Memes Net Neutrality Bring Your Own Device Management Samsung Device security Human Resources Webcam Microsoft Excel Financial Data Uninterrupted Power Supply Wireless Headphones Scams Business Mangement Going Green Music Business Cards Risk Management IT Tech Error Tablets Public Speaking Google Apps Inbound Marketing Telework Bookmark Streaming Media Microsoft 365 Cables Download Supercomputer Piracy Keyboard Smartwatch Botnet Communitications Google Calendar Term Procurement Rental Service Virus Micrsooft HTML Hard Drives Motion Sickness intranet FinTech Browsers Flash Nanotechnology Telephone Systems Point of Sale Google Drive Upload Wireless Business Growth Software License Electronic Payment Shortcut CES IT Assessment Comparison Google Play Environment Supply Chain Management Value Social Network Heating/Cooling Social Networking Organization Cyber security Knowledge Data Analysis Windows XP Shortcuts Corporate Profile Screen Reader Banking Telephony Trends Google Wallet Employer Employee Relationship Mobile Technology Phone System Smart Devices Television Security Cameras Remote Working Messenger Customer Resource management Deep Learning Cabling Devices G Suite Tip of the week AI Trend Micro Fileless Malware Be Proactive Tablet Business Metrics Transportation VoIP Gamification Hosted Solution Tracking Company Culture Digital Security Cameras Electronic Health Records Mouse Books Wasting Time Telephone System Regulations Society Web Server Computer Accessories eCommerce Directions Language Modem Workplace Strategies Backup and Disaster Recovery Content Staffing Digital Payment Desktop Videos Surveillance SharePoint Reading Managing Costs Electronic Medical Records Monitors Worker Accountants IP Address Visible Light Communication Windows 8 SSID Access Database Employer/Employee Relationships Time Management Public Cloud Media Development

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?