ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Once you’ve encrypted a file, don’t think that it’s encrypted for good. You’ll have access to a decryption key, which is used to read the file again after the encryption process. Think of it as the picture on the box that lets you put a jigsaw puzzle back together after it’s been ripped apart and scattered on the floor.

Encryption has been all over the news lately, as ransomware attacks like WannaCry have become a blight for users everywhere. Hackers use ransomware to encrypt files against the user’s will, and they hold the decryption key hostage in an attempt to extort a ransom from the user. While the method of use is quite different for ransomware, it does show how good encryption can be for keeping unwanted users from accessing sensitive information.

NOTE: Before breaking down the steps to encrypting a file, we want to make it clear that data security and encryption is not for everyone to use without discrimination. The majority of users will want to entrust their data and its integrity to an IT Professional, like those at ClearView IT.  IT Techs will determine which data should be encrypted, evaluate that it is done properly and ensure that the correct parties are able to access the data while keeping threats out. It’s extremely important that you don’t encrypt data in a shared environment. If you encrypt shared data, users that would normally have access to the data, won’t. In cases like this, it’s better to let a software solution implemented by IT do the heavy lifting for your company’s standardized file encryption.

To encrypt a file or folder in Windows, locate the data that you want to encrypt. Next, follow these steps.

Select the file or folder, right-click it, and go to Properties.

Next, a new window will open. Select the General tab and click the Advanced button.

ib 1 encryption

Check the box that says Encrypt contents to secure data. With this box selected, you should next click Apply and OK.

ib 2 encryption

Depending on whether you want to encrypt a single file or a folder, you’ll see a new window that asks you to confirm just how much data you’ll be encrypting. Select the desired button and click OK.

ib 3 encryption

Now your file should be encrypted, as indicated by the padlock on your file’s icon. It’s safe to say that your file is a bit more secure now, but encryption isn’t an absolute guarantee, and you shouldn’t rely on it completely. For business purposes, we recommend something a bit more comprehensive.

If you need even more help protecting your business’s assets, don’t hesitate to reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Networking Workplace Strategy Windows App Virtualization Spam WiFi Business Technology Blockchain Bandwidth Encryption Server Mobile Device Management Information Remote Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 Budget Gmail History Health BDR Analytics Cybercrime Wi-Fi Conferencing Access Control Data Security Big Data Help Desk Vendor Hacking Cost Management Remote Monitoring Remote Computing Voice over Internet Protocol Document Management Hacker IT Management Save Money Training Compliance Patch Management Employer-Employee Relationship Applications Retail Alert Project Management Vulnerabilities Hiring/Firing Outlook Legal Password Mobile Office Data storage Money Managed Services Customer Service Unified Threat Management Firewall Data loss Augmented Reality Word BYOD Search... IBM Website Computing Best Practice Vendor Management Hard Drive Antivirus The Internet of Things YouTube Maintenance Twitter Windows 11 Monitoring User Law Enforcement End of Support Laptop Healthcare Printer Websites Remote Workers Meetings Mobility Windows 7 Chrome Free Resource Google Maps Sports Travel Scam Social SaaS DDoS Virtual Reality How To Social Engineering Cryptocurrency Mobile Computing Black Market VPN iPhone Cleaning Education Marketing Cortana Robot Update Content Filtering Running Cable Data Breach Storage Router Paperless Office Chromebook Drones Cooperation Automobile Video Conferencing Physical Security Virtual Machines How To HIPAA Computer Repair Multi-factor Authentication Wireless Technology Microchip eWaste Start Menu Professional Services Flexibility Computer Care Downloads Vulnerability Saving Time Downtime Hack Safety Identity Theft Software as a Service Managed Services Provider Notifications Unified Communications Data Protection Computers Bitcoin Virtual Desktop Virtual Private Network Telephone Experience Google Docs Bluetooth Current Events Distributed Denial of Service PowerPoint Office Tips Administration Private Cloud Memory Excel Solutions Presentation Specifications Disaster Tech Terms Images 101 Integration IT Consultant Display Managed IT Politics Machine Learning Customer Relationship Management Settings Lithium-ion battery Digital Virtual Assistant Co-Managed IT Employees Entertainment Solid State Drive Taxes Avoiding Downtime Processors Holidays Processor File Sharing Virtual Machine Username Monitors Redundancy Reviews Visible Light Communication Startup Optimization Freedom of Information Smart Technology Reading Teamwork Navigation 2FA Windows 8 Cache Addiction email scam Data Storage Workers Mobile Security Hypervisor Troubleshooting Unified Threat Management Public Speaking Displays User Tip Shopping Advertising Legislation News Medical IT Relocation SQL Server Streaming Media Work/Life Balance Printing Evernote Paperless Tech Support Network Management CCTV Touchscreen PCI DSS Licensing Keyboard Hard Drives Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure In Internet of Things Business Communications intranet Vendor Mangement Service Level Agreement Internet Service Provider Management Regulations Compliance Samsung Device security Managed IT Service Business Owner Wireless Hacks Shortcut Network Congestion Heating/Cooling Writing Environment Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Reliable Computing Business Cards Windows XP Tech Human Resources Social Networking Business Mangement Going Green Net Neutrality Error Financial Data Tablets Bookmark Risk Management IT Scams Scalability Supercomputer Piracy Administrator Text Messaging Google Calendar Term Google Apps Proactive IT Download Virus Telework HTML Inbound Marketing Bring Your Own Device Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Software License Comparison Google Play Music Google Drive Upload Procurement Social Network FinTech Staffing IP Address Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Electronic Payment Employer Employee Relationship Mobile Technology Value Botnet Television Security Cameras Telephony Trends Supply Chain Management Micrsooft Customer Resource management Organization Cabling Devices Cyber security Shortcuts Rental Service Phone System Flash Fileless Malware Tablet Smart Devices G Suite Tip of the week Tracking Company Culture Telephone Systems Mouse Business Growth VoIP Gamification Remote Working Competition Telephone System AI Regulations Trend Micro Be Proactive Recovery Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Digital Payment Desktop Wasting Time LiFi Banking SharePoint Entrepreneur Google Wallet Content Application Deep Learning Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Documents Messenger Computer Accessories Videos Business Intelligence Access Database Surveillance Public Cloud Managing Costs Business Metrics Hosted Solution Time Management Health IT Equifax SSID Securty Books Domains Language Audit Media Society Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?