• Skip to primary navigation
  • Skip to main content
WinZip Enterprise Blog

WinZip Enterprise Blog

Protecting the world's most sensitive data for over 30 years.

  • Articles
    • Backup
    • Company News
    • Compression
    • Encryption
    • File Sharing
    • Security
  • Resources
  • Get a Quote

How to securely upload files to Google Drive

WinZip Blog

By 2020, six out of 10 businesses had migrated their data to cloud storage systems, and 81% of businesses had at least one application running in the cloud. Cloud storage systems help businesses and their employees store and access data. Authorized users can access these systems and their contents from various devices while working on or offsite.

When used in combination with other storage systems, such as portable storage devices, cloud storage systems are an intrinsic part of a comprehensive data backup and storage solution.

Google Drive’s 2 billion users make it a very popular cloud storage system. But while user-friendly, Google Drive does not offer enterprise-level security measures, such as the ability to encrypt a folder.

Organizations that handle sensitive data, especially large quantities, such as government agencies, healthcare organizations, and financial institutions, must therefore look to third-party providers for these extra levels of security.

In this article, you’ll learn more about what Google Drive is, how to upload files to this platform, as well as how to do so using a solution like WinZipⓇ Enterprise.

What is Google Drive?

Google Drive is a cloud-based storage solution that enables users to store, synchronize, and share files. The service offers enhanced file-based collaboration by enabling users to customize who can view, comment, or edit shared files. The platform also lets users simultaneously access a single live document or file and view or edit it together in real-time.

Google Drive provides its own version of commonly used business tools such as spreadsheets, slide decks, and word documents. For example, Google Drive offers Google Docs, which is an alternative to Microsoft Word, Google Slides as a stand-in for PowerPoint, and Google Sheets, which is Google’s equivalent to Microsoft Excel.

To ensure that only authorized users have access to certain files, Google Drive offers custom sharing permissions. Administrators can customize viewing and sharing settings by group, department, user, and more. These customizable permissions ensure that the right people can access the necessary content for their job function without compromising data security.

With Google Drive, users can upload and save numerous file types including documents, spreadsheets, archive files, videos, images, and more. In fact, Google states that it can store any file type if you do not exceed the maximum file sizes listed below:

  • Documents: Up to 1.02 million characters or up to 50 MB if you convert the text document to a Google Doc.
  • Spreadsheets:Up to 5 million cells or 18,287 columns for spreadsheets created in or converted to Google Sheets, as well as Excel and CSV imports from Microsoft Excel.
  • Presentations: Up to 100 MB if you convert the presentation to Google Slides.
  • All other file types: Up to 5 TB.

How to upload files to Google Drive

You can upload files to Google via your desktop computer or via the mobile app versions of Google Drive for Android and iOS mobile operating systems. Note that you will need a free Google account to access Google Drive and perform any of the following activities.

How to upload files to Google Drive via computer

You can easily upload files or folders from your computer to Google Drive. To do so, follow these steps:

  1. From your browser, navigate to drive.google.com.
  1. From the top left, click the “New” icon.
  1. In the box that appears, click “File Upload” to upload a single file. Click “Folder Upload” to upload a folder.
  1. A box will appear that enables you to navigate through your computer’s files. Navigate to where you have stored the file or folder you wish to upload. (For example, if you saved this file/folder to your Desktop, navigate to Desktop and then click on the file or folder.) Choose the file or folder you want to upload.
  1. Click “Upload.”

How to upload files to Google Drive via desktop drag-and-drop

You can also drag and drop files into Google Drive. To do so, follow these steps:

  1. From your computer, navigate to drive.google.com.
  1. Open the folder where you wish to upload your files, or create a new folder by clicking the “New” icon then selecting “File” or “Folder.”
  1. Locate the files or folders you have saved locally and wish to upload to Google Drive. You may need to slightly minimize the window in which you have Google Drive open in order to locate these files.
  1. Click on the desired files or folders and drag them into the Google Drive destination folder.

How to upload files to Google Drive via computer using Google Drive for desktop

Google offers a Google Drive for Desktop application for Windows or macOS devices. This app provides access to Google Drive from your local desktop without opening a web browser. (With macOS, you can do so via Finder; with Windows, via File Explorer.) With Google Drive for Desktop, users can sync files between their device and Google Drive.

To upload files using this application, follow these steps:

  1. Install Google Drive for desktop onto your Mac or PC. Note: Unless you specify otherwise during the installation process, Google Drive will appear as an icon in your taskbar (for Mac) or on your desktop (for PC).
  1. Drag files or folders into the Google Drive folder.
  1. These files and folders will automatically upload to Google Drive. You can therefore access them at drive.google.com or from any device that has the Google Drive app and is logged in to your Google account.

How to upload files to Google Drive via Android phones or tablets

  1. From your Android phone or tablet, open the Google Drive app.
  2. Tap Add (the plus sign icon).
  3. Tap Upload.
  4. Locate the files you wish to upload.
  5. Tap these files to upload them.

How to upload files to Google Drive via iPhone or iPad

  1. From your Android iPhone or iPad, open the Google Drive app.
  2. Tap Add (the plus sign icon).
  3. Tap Upload.
  4. Locate the files you wish to upload.
  5. Tap these files to upload them.

How to upload encrypted files to Google Drive with WinZip Enterprise

Even Google is not immune to hacks. In 2014, the passwords of five million Google accounts were obtained by hackers. In 2018, another data breach resulted in unauthorized access to personal information related to 52.5 million users. And in 2019, Google announced that a defect in its now-defunct social media platform, Google+, exposed the data of 500,000 users to more than 400 third-party developers.

To keep your Google Drive data safe, Google employs cryptographic security protocols such as Hypertext Transfer Protocol Secure (HTTPS) and Transport Layer Security (TLS). HTTPS is a certification awarded to sites that are encrypted using Transport Layer Security (formerly known as Secure Sockets Layer, or SSL).

TLS encrypts data sent between locations and devices via the internet, which makes it harder for hackers to access and utilize this data for nefarious purposes, such as cyberattacks or ransomware.

However, there are still potential weaknesses in Google Drive despite these security measures. As mentioned earlier, it does not offer end-to-end encryption, where data is encrypted prior to being transferred to another device, and then decrypted once it reaches its final destination. The keys to encrypting and decrypting this data are stored on the initial and final devices.

With no end-to-end encryption in place, companies cannot guarantee complete control over who views their client and customer data on Google Drive. However, certain security solutions, such as WinZip® Enterprise, encrypt your data and allow you to password-protect files in order to thoroughly secure sensitive information while stored in the cloud or on other types of storage systems.

WinZip Enterprise password protects and encrypts files on Windows operating systems. The solution integrates directly with existing cloud storage solutions including Google Drive, enabling users to easily encrypt and password-protect their files before storing them in the cloud.

To encrypt files using WinZip Enterprise, follow these steps:

  1. Open WinZip.
  2. In the Actions pane, click Encrypt.
  3. Drag and drop the files you want to encrypt into NewZip.zip.
  4. Enter a password. (Ensure that it’s a strong one, and be sure to save or store it securely, since it will be required to access the contents of the encrypted folder.)
  5. Click OK.
  6. From the Actions pane, click the Options tab.
  7. Select Encryption Settings.
  8. Set the level of encryption that you want and click Save. (WinZip recommends AES-128 or higher.)

You now have a password-protected and encrypted folder, which you can upload to Google Drive following the steps outlined earlier in this article.

Learn how WinZip Enterprise can help your organization securely upload files to the cloud.

How to protect your company’s databases and other organizational data

WinZip Blog

How to Protect Your Company’s Databases and Other Organizational Data

A company’s database and data repositories contain its most valuable asset: information. This information, if compromised, could negatively impact an organization’s assets, finances, and reputation.

Data protection is the means of securing your digital information to prevent or reduce the risk of information loss, compromise, or corruption. The right tools, controls, and processes help protect enterprise databases and other critical data assets from unauthorized access and cyberattacks.

Protecting enterprise databases and other organizational data is important not just for cybersecurity, but also to ensure business continuity and maintain a competitive market advantage.

In this article, we’ll look at how companies benefit from data protection, the consequences of inadequate data protection measures, and the various ways you can protect organizational data and company databases.

The importance of protecting company data

Enterprise-level organizations collect, store, and manage large amounts of data. Some of this data is structured, which means it is organized and easily accessed by users.

However, 80% of all enterprise data is unstructured, which cannot be analyzed or processed using structured data procedures. From documents to images, videos, and audio streams, your company’s unstructured data also contains sensitive, business-critical information, including (but not limited to):

  • Intellectual property.
  • Financial records.
  • Cardholder data.
  • Third-party contracts.

While databases can be controlled with access privileges and managed by IT admins, unstructured data has fewer controls available to ensure its security.

Unstructured data is user-generated content that may be stored on-premises, in cloud-based storage systems, or in cloud-based applications. As such, controlling access and management of unstructured data falls on internal users.

If your employees are not well-educated on the risks associated with sharing and managing data, they are more likely to operate outside of your company’s security standards. This can lead to what is known as shadow IT, where employees use devices and/or technology for work purposes without their IT team’s knowledge or approval.

Whenever a user accesses a shadow IT application, your data is stored in an unknown and unauthorized location. These unapproved solutions are more common than you might think—80% of employees admit to using applications without IT approval.

This lack of awareness regarding data protection contributes to human error, which is a top threat to your company’s information security. Cybersecurity incidents are pervasive, with cybercriminals always looking for new access points and attack vectors.

Negligence, lack of cybersecurity awareness, and poor access control are key problems associated with human error. Fixing human error issues starts by understanding your security risks, developing appropriate security controls, and mitigating cybersecurity risks.

Having a comprehensive business data protection strategy in place can help your organization minimize or avoid system vulnerabilities. Effective protection strategies are data-centric, going beyond regulatory requirements to also consider and plan for real-time security threats.

The cost of inadequate data protection

In 2021, there was a sharp increase in data breaches and ransomware attacks, compromising sensitive information of millions of victims. By October 2021, the number of data breaches for the year had already sailed past the total for 2020.

Ransomware also experienced record-setting attack volumes, with a reported 304.7 million attempted hacks in the first half of 2021. The entirety of 2020, by comparison, saw a total of 304.6 million ransomware attempts.

Once an organization experiences one ransomware attack, the next may be right behind it. Reports find that 80% of companies that previously paid ransomware demands were exposed in a second attack.

Direct and indirect costs

When databases and data are not properly protected, there are direct and indirect costs that can impact your company’s bottom line.

  • Direct costs are those associated with handling cybersecurity events, such as:
    • Fines.
    • Investigation costs.
    • Reimbursement to affected parties.
  • Indirect costs are connected to resources spent to recover from the data breach. For example, operational downtime leads to financial loss.

Downtime that impacts IT networks averages $5,600 per minute, and 33% of surveyed enterprise organizations indicated that an hour of IT downtime would cost them $1–5 million.

Reputational damage is another indirect cost of inadequate data protection. When you lose customer loyalty and trust, you also face the risk of losing potential customers as people share their experiences.

Insider risk is a prime vulnerability for every organization. A 2021 survey found that 94% of companies were subjected to an insider data breach in the last year. Most of these incidents were caused by human error.

While human error is not malicious, it is costly—data breaches caused by human error average a cost of $3.33 million per incident. In the US, a data breach cost the affected organization an average of $4.24 million in 2021. This amount is 10% more than the average cost in 2019.

Industry-specific data protection considerations

Organizations that operate in heavily regulated industries will pay more in non-compliance fines. For example, healthcare data breaches are significantly more expensive than other data breaches due to the industry’s stringent data privacy policies.

In the US, the Health Insurance Portability and Accountability Act (HIPAA) regulates the use of and access to Electronic Protected Health Information (ePHI). Its rules and regulations are based on three primary components:

  • Privacy Rule. This rule standardizes the protection of individually identifiable health information, which is information that can be linked to a specific person.
  • Security Rule. This rule is specific to ePHI and identifies the administrative, physical, and technical safeguards needed to protect the confidentiality, availability, and integrity of ePHI.
  • Breach Notification Rule. This rule requires organizations to report the discovery of a breach of unsecured PHI and notify the affected individuals, the Department of Health and Human Services (HHS), and the media (in certain situations).

In 2020, the Premera Blue Cross health plan received a $6.85 million HIPAA penalty due to a data breach that exposed 10.4 million individuals’ ePHI. This penalty was in addition to a $10 million settlement to resolve a multi-state lawsuit and a separate $74 million settlement stemming from a consolidated class action lawsuit against the health insurer.

Any breach that includes customers’ Personally Identifiable Information (PII) will be more expensive than other data sets. The average cost per record for all data types in 2021 was $161, compared to $180 per records containing PII.

In addition to increasing the cost of the breach itself, compromised PII can lead to costly lawsuits. For example, Morgan Stanley faced a class-action lawsuit stemming from data exposure that impacted around 15 million individuals.

The banking and financial services company agreed to a $60 million settlement in 2022. This settlement amount is in addition to the $60 million fine imposed by the Office of the Comptroller of the Currency (OCC) for its data protection failures.

The benefits of a comprehensive company database protection Plan

A comprehensive data protection strategy establishes controls and policies related to an organization’s personnel, processes, and technologies. This is a multistep process that safeguards the integrity, availability, and confidentiality of organizational data.

Database protection plans are based on three primary goals:

  • Data security. The controls, policies, and procedures that protect data from malicious or accidental damage.
  • Data availability. The process of making data available through redundancy and backups to ensure quick restoration following damage or loss.
  • Access control. The means of restricting access to data to only those who need it.

Some of the most important elements of a database protection plan include:

1. Customize access controls

An access control system restricts access to data and/or resources based on the required task. This helps prevent unauthorized access and ensures that people have the access necessary to perform their jobs.

Access requirements should follow the principle of least privilege (POLP), which grants access rights based on what is necessary for the users’ job functions. It is also important to conduct regular reviews of your access controls to identify and correct unnecessary permissions.

2. Secure endpoints

The endpoints that connect to a corporate network are especially vulnerable to cyberattacks and breaches. From laptops to smartphones, workstations, servers, and other network access paths, endpoint security ensures that organizational data cannot be lost or stolen.

Endpoint protection starts by identifying all devices that connect to your network resources. Then, the devices should be secured using antivirus software, data encryption, firewalls, and application and access controls.

3. Educate users on security protocols

When employees do not have enough information about how their actions (or inactions) impact cybersecurity, it increases the risk of human error. From reusing passwords to not keeping applications up to date, there are several ways in which your employees can inadvertently set the stage for malicious cyber activity.

Educate employees on best practices to protect organizational data and databases, which include:

  • Implement multi-factor authentication.
  • Install software updates and patches as they become available.
  • Identify and report suspicious activity, such as emails with attachments from unknown sources.

4. Encrypt your files

File-level encryption restricts access to authorized users and can only be decrypted with the right password or encryption key. If the data cannot be read, malicious actors cannot decipher what they’ve stolen.

Encryption can protect organizational data in several ways:

  • Removable storage media. Encrypting data stored on a thumb drive, memory stick, or other portable device prevents unauthorized access if the device is stolen or lost.
  • File transfers. Unsecured and wireless networks can expose sensitive data to bad actors. Encrypted files will be protected even as they move between various users, devices, and networks.
  • Backups. Backups make it possible to restore data that has been lost, damaged, or stolen. Encrypting backup data adds an additional layer of protection and ensures that only authorized users can access the files.

A solution like WinZip® Enterprise offers a fully customizable set of enterprise-grade tools to secure, manage, and protect enterprise databases and organizational data. It features military-grade encryption for secure file sharing and collaboration with end-to-end data protection.

With WinZip Enterprise, IT administrators have complete control over the data environment, making it easy to implement and enforce policies related to file security, sharing, and backups.

Discover how WinZip Enterprise can help protect your company’s database.

How to open a zip file on an iPhone

WinZip Blog

How to Open a Zip File on an iPhone

It can be difficult to comprehend the amount of digital data we generate via social media platforms, online marketplaces, medical facilities, and through government, education, and financial institutions.

At the start of 2020, the number of digital bytes worldwide was 40 times the number of stars in our observable universe. The World Economic Forum estimated the amount of global digital data to be 44 zettabytes. A zettabyte is one sextillion bytes––1,000 bytes to the seventh power––and has 21 zeros.

With so much data being generated and shared, institutions and individual users rely upon zip files and file compression to securely and quickly share information.

In this article, we discuss the value of file compression, its uses for businesses and employees, and how to open zip files on mobile iOS devices.

What is a zip file?

Imagine you would like to send multiple files (e.g., Microsoft Word documents or photos) to someone via email. One option is to attach each file individually, but this can easily become cumbersome and inefficient.

To make file sharing easier, you can create a zip file, which is a way of grouping (also called “archiving”) multiple digital files. Once zipped, these files act like one file. In the example above, you would need to attach and send one file, which the receiver would open to view the entire zip file’s contents.

Zip files are just one of many ways to archive files (other examples include ARC, ARJ, RAR, and CAB), but they are not the most common. They archive encoded information that is unusable by other applications until it is extracted from the file and decompressed. Zip files are not limited to a single type of data. They may include images, audio, video, and more.

How do zip files work?

Zip files are created through the process of file compression. A compressed file contains one or more files that have been reduced in size, which makes them easier to transfer or store. Once received, compressed files can be decompressed back to their original state without degradation in quality.

Zip files specifically work through lossless compression, which removes redundancies (the same data pieces that are stored in multiple places within the storage environment).

For example, uncompressed data may look like this: AAABBBBBCC.

While lossless file compression may look like this: A3B5C2.

The new, compressed code—A3B5C2—holds the same information as the original code. However, by using numbers to signify the number of times the data repeats, the second code takes up less space.

Files in a zip archive are compressed individually, so you can extract or add new data without compressing/decompressing the entire archive. When you decompress the file, it goes back to its original form.

Why do businesses use zip files?

Zip files help businesses organize, share, and store data quickly and efficiently. Some of the many ways zip files are used include:

  • To free up space on a device. Zipping large files can save 80% or more of available storage space. For example, images saved on your computer may take up a lot of space; compressing them into zip files will free up space but enable them to remain readily available.
  • To transfer data. Sending large files or several documents can be cumbersome and time-consuming. (If you have ever waited for a file to download, you understand this first-hand!) Compressing data into a zip file increases transfer speed and gives the recipient a single, organized folder that contains everything they need.
  • To save time. Zipping content saves storage space on the server, decreases the time it takes to transfer/download, and organizes all files in a single zip file for better file management.
  • To store more data. Businesses store and process an enormous amount of information every day. Because zipped files are smaller, you can store and share more data on a server, in an email, or on portable storage media.
  • To organize data. A survey by SmartFile of more than 421 IT administrators within the US concluded that businesses lose an average of $17,000 in productivity costs annually due to poor file management. Since zip file names end with “.zip,” users easily identify zip extensions to quickly locate files and differentiate them from files of other origins (such as PDF or .jpg).

Why would employees need to open zip files on an iPhone?

Gartner predicts that 31% of the global workforce will be remote in 2022 and 53% of the US workforce will be a hybrid of remote and on-site work.

The increasing popularity of remote work shifts how IT resources are used. Zipping files makes it easier for off-site personnel to access content quickly and securely without worrying about slow transfers, prolonged downloads, or storage limitations.

Basic zip file features are built into the operating systems for Windows or macOS computers, which means that if you use one of these types of computers, you do not need additional software to create and open zip files.

Workers operated on an average of three devices in 2019 and will use an average of four by 2024. As the number of devices used by employees continues to increase, the need for employees to access important zipped documents, images, and other media types directly on their smartphones will also rise.

This means that the use of the 1 billion active iPhones around the world will likely increase as well. Apple controls all aspects of its technological ecosystem including hardware, firmware, and software. It’s thus no surprise that, when iOS users around the world are broken down by industry, 22% are in computer software and 14% are in information technology and services.

However, iPhone use extends beyond these verticals, as workers in all types of industries may need to complete work-related tasks on an iPhone while on the go.

Hypothetical scenarios for iPhone use in the workplace include:

  • A nurse needs to quickly review patient information (e.g., test results or image diagnostics), and doesn’t want to spend valuable time finding a dedicated computer workstation.
  • A truck delivery driver needs to access zipped files that contain details about his next few routes.
  • An employee who is on the way to the airport needs to view an email that includes attached zip files.

When running iOS 13 or later, employees can copy and back up file contents to USB flash drives and SD cards. This feature enables easier file sharing between devices that historically did not communicate directly. Previously, users typically relied upon a third device, such as a laptop or desktop computer, to receive files from one device and send them to another.

How to open zip files on an iPhone

The process for opening a zip file will differ depending on if the zip file is from your email inbox or from another source on the internet, such as a company’s cloud storage.

To open a zip file from your email app on your iOS device, complete the following steps:

  1. Open your device’s mail application. This could be the standard iOS Mail app or a third-party application such as Gmail’s Mail app.
  2. Open the email that contains the zip file you wish to open.
  3. Tap on the file. In the menu that appears, tap the Share icon (the square with an arrow).
  4. In the menu that appears, tap “Save to Files.”
  5. Open the Files app.
  6. Locate the file you wish to open.
  7. Tap the zip file. Your device will automatically begin unzipping it.
  8. A new screen will appear with the name of the zip file. From this screen, you can preview the files before deciding which to open or download, or you can download the files.
    • To preview the zip files, scroll through the files by swiping left.
    • To download any file, tap the word “Download.”

To open a zip file from the internet, complete the following steps:

  1. Locate the zip file you wish to download. This will vary depending on your company; in many cases, it will be located within your company’s cloud storage account.
  2. Download the file to your iPhone. Note that download options will also vary depending on where the file is located.
  3. On your device, open the Files app.
  4. Locate the file you wish to open in the “Downloads” section of the app.
  5. Tap the zip file. Your device will automatically begin unzipping it.
  6. A new screen will appear with the name of the zip file. From this screen, you can preview the files before deciding which to open or download, or you can download the files.
    • To preview the zip files, scroll through the files by swiping left.
    • To download any file, tap the word “Download.”

The steps for opening zip files on an iPhone differ depending on which iOS system your phone uses. If your iPhone runs on iOS 13 or later, you will not need a third-party app to open zip files. Prior to this version, the Files app of iOS devices could only unzip files or uncompress zip archives.

Use WinZip Enterprise for secure file sharing

WinZip® Enterprise is a comprehensive solution that provides enterprise-grade features to enable organizations to secure and manage files (including zipped ones), enforce access control and protocols, and equip their teams to work collaboratively yet safely.

WinZip Enterprise provides businesses with the following key benefits:

  • Enterprise-level compliance. This solution adheres to Windows Information Protection (WIP), which is a series of policies designed to protect data at rest on endpoint devices, as well as in transit. It’s also Federal Information Processing Standards (FIPS) 140-2 compliant.
  • Advanced encryption. WinZip Enterprise offers FIPS 192 certified encryption, which is the Advanced Encryption Standard (AES) that requires FIPS-approved encryption to protect electronic data.
  • Secure file sharing and collaboration. Password protection, read-write privileges, and other custom controls for individuals and groups ensure access privileges for the right people.
  • Complete IT control. Through its centralized console, WinZip Enterprise places custom control in the hands of IT administrators who can immediately set (and revoke) permissions and access controls.

Discover how WinZip Enterprise provides a simple, secure solution for zipping sensitive files.

How to encrypt an Excel file

WinZip Blog

Originally launched in 1985, Microsoft Excel has long been an essential software and management tool for 99.99% of businesses, with versions available for Windows, MacOS, Android, and iOS.

This nearly ubiquitous spreadsheet software offers features such as calculations, graphing, and data sorting. Excel is commonly used for all sorts of organizational tasks such as budgeting, planning, data reporting and analysis, and more.

But how safe is Excel for transferring sensitive data?

In 2020, Microsoft’s Security Intelligence team announced it had detected a phishing campaign that specifically targeted Excel. The campaign was based around an email that appeared to come from a medical center. The email was related to the COVID-19 pandemic and came with an Excel attachment. If downloaded and opened, the Excel file displayed a graph of COVID-19 cases in the US and a security warning.

If users bypassed the warning and allowed the file to run, the device would download and run NetSupport Manager, which is a remote access tool often used by hackers to control external devices, such as a victim’s computer.

Microsoft admitted that this campaign was just one of hundreds that targeted Excel. But Microsoft was not the only target: by September of 2021, data breaches across industries and software programs had surpassed breaches from the year prior by 17%.

Unauthorized access is responsible for 20% of breaches, making compromised credentials stand out as a leading cause of data breaches. Remote working and subsequent digital transformations (e.g., moving to face-to-face meetings to teleconferencing technology) due to the COVID-19 pandemic increased the average cost of a data breach by 10%.

Encryption can be key to mitigating unauthorized access to cloud-based storage systems, email accounts, computers, laptops, tablets, and portable storage devices.

This encryption should extend to Microsoft Excel files. Since Microsoft Excel spreadsheets often contain numerical inputs, its files may contain sensitive information, such as financial data. It is therefore vital to encrypt Excel files to protect the data within.

This article explains how encryption works, why enterprise-level companies need to encrypt Excel files, and provides step-by-step instructions on how to encrypt Excel files using a security solution like WinZip® Enterprise.

How does encryption work?

Encryption keeps sensitive information safe from unauthorized access. The encryption process takes data and transforms it into another form or code that can only be accessed with a decryption key or password. Unencrypted data is known as plain text; encrypted data is called ciphertext.

Encoding (and decoding) data is accomplished using encryption algorithms (also known as ciphers). Part of the algorithm is an encryption key. An encryption key is a variable value which creates the cipher’s unique output. As the name suggests, it is the key to unlocking the encrypted text.

Why enterprise-level companies need to encrypt Excel files

Unfortunately, Microsoft Excel files are common targets for malware––especially when these files are sent via email. Verizon reports that 46% of malware attacks that happened to organizations in 2020 originated from an email.

Microsoft products are particularly susceptible to macro viruses, which are viruses that use the same macro language as software programs such as Microsoft Word or Microsoft Excel. Since the virus is written using the same language as these software programs, it can corrupt documents––and your device’s software.

Unauthorized access to files and data can be detrimental to both the companies and their clientele. Potential consequences of unauthorized access include the following:

  • The manipulation or destruction of sensitive data. Unauthorized access by nefarious third parties can lead to tampering with Excel files containing important information. If these files are not backed up on other devices, this data can be irretrievable.
  • Negative impact on a company’s reputation. A Forbes study reports that 46% of businesses experience damage to their reputation and brand value because of a data breach. An additional 19% of organizations suffer reputation and brand damage caused by either a third-party security breach or an IT system’s failure.
  • Loss of revenue. While a data breach can harm an enterprise’s reputation and deter potential customers, it may also affect the organization’s current customer base. PricewaterhouseCoopers (PwC) reports that 87% of consumers are willing to cut ties with a business when data breaches take place.
  • Regulatory ramifications. Businesses must adhere to specific regulatory standards for data privacy. These standards will vary by industry. Merchants, vendors, and financial institutions, for example, must follow the Payment Card Industry Data Security Standard (PCI DSS) for transactions.

    Healthcare entities must abide by the 1996 Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act, which requires protection of protected health information (PHI) in electronic health and medical records.

  • Legal ramifications. Compromised data brings into question whether companies have taken all possible measures to secure client or customer data as per federal law. Therefore, in the event of a breach, class action lawsuits are not uncommon. Equifax’s 2017 data breach, for example, cost the company $700 million in payouts to affected US customers.

Encrypted files are password-protected, which ensures that only authorized individuals can open, read, or edit the files. Since encrypting Excel files allows users to control who can access and edit sheets and workbooks, encryption helps to maintain data integrity and avoid the repercussions of data breaches.

How to encrypt an Excel file using WinZip Enterprise

WinZip Enterprise is a file encryption and security solution designed for large companies that handle vast amounts of sensitive data, such as government and military agencies, healthcare companies, and financial institutions.

To encrypt an Excel file using WinZip Enterprise, complete the following steps:

  1. Open WinZip Enterprise.
  2. In the Actions pane, click on Encrypt.
  3. Drag and drop your Excel file to the center NewZip.zip pane.
  4. In the dialog box that appears, enter your password.
  5. Click OK.
  6. Click the Options tab in the Actions pane and choose Encryption Settings.
  7. Set your desired level of encryption.
  8. Click Save.

Benefits of using WinZip Enterprise for file encryption

As mentioned, the process of encrypting and decrypting data is called cryptography and the formulas used to code and decode encryptions are called encryption algorithms. Although numerous encryption algorithms have been developed and used over time, Advanced Encryption Standard (AES) is one of the most popular today.

The Advanced Encryption Standard (AES) is the encryption algorithm used by most governments, financial institutions, and enterprises that require high levels of data security, such as insurance and healthcare companies.

The AES algorithm works by separating data into small blocks (called “bits”) and then applying mathematical codes to these bits. Bits typically come in sizes of 128, 192, or 256 and are referred to as 128-, 192-, or 256-bit keys.

The longer the bit key length, the greater the security of the AES system. However, even the smallest bit key (128) remains resistant to “brute force attacks” such as a supercomputer rapidly generating and applying numerical codes in an attempt to decipher the AES’s cryptographic algorithm. It is estimated that it would take a supercomputer more than 100 trillion years to crack a 128-bit AES.

WinZip Enterprise uses AES encryption with a 128-, 192-, or 256-bit key to encrypt and decrypt data. With AES encryption and secure password protection, your files are protected as you share them via email, cloud-storage systems, or with portable storage devices.

Since WinZip Enterprise also compresses your encrypted files, they are easier to upload and share. Word-based documents, for example, have files that can be compressed to 90% of their original size. It can also compress MP3 files by 15 to 20% and JPEG files by 20 to 25% without loss to photo or audio quality or data integrity. Excel files can be compressed up to 93% but rates vary significantly, since Excel files may have embedded images or other elements that affect compression size.

These compressed files can be transferred much faster than their uncompressed versions.

It takes one tenth of the time to transmit a compressed file than it takes to send the original (uncompressed) file. Since users spend less time waiting for files to transfer and download, these faster transfer times help improve employee productivity.

In addition, compressing files helps companies cut data storage costs, which can be significant. For example, enterprise-class hard drives can cost hundreds of dollars, and cloud-based storage solutions are often priced based on the amount of data stored.

With its encryption and compression capabilities, WinZip Enterprise keeps your organization’s data safe, reduces data storage requirements, improves productivity, and helps prevent costly and detrimental data breaches.

Explore how WinZip Enterprise can help your company encrypt its digital assets.

Top five benefits of secure enterprise file storage

WinZip Blog

Top 5 Benefits of Secure Enterprise File Storage

Today’s work environments are changing, thanks to the ongoing global pandemic plus new technology advances. The days of dedicated workstations with an assigned computer are over—55% of global businesses currently offer some capacity for remote or hybrid work.

This shift means that employees now access work-related data and software applications via multiple devices such as laptops, tablets, and smartphones. The number of devices used continues to increase: Workers operated on an average of three devices in 2019 and will use an average of four by 2024.

More than 50% of employees access data on personal devices such as their own laptops and smartphones—often via unsecured networks such as public Wi-Fi. Accessing sensitive data on unsecured networks or devices increases cybersecurity risks, including data theft, ransomware, and viruses.

Cybersecurity attacks on businesses continue to increase

Cyberthreats continue to increase in number and severity. By September of 2021, the year’s data breaches outnumbered 2020’s by more than 17%. Cyberattacks also increased by 27% last year—and cost companies an average of $1 million more when remote work was a factor in the attack.

Cyberattacks pose real threats with file storage, which is the method used to organize and store data on a hard drive or storage device. Portable devices such as flash drives are popular storage solutions for employees who need to move files between work and home environments, but they leave organizations more vulnerable to cyberthreats.

Although these devices are often essential for file sharing and storage, they pose numerous cybersecurity risks as they are easily lost, breached, or misappropriated.

Employees also often bring their own flash drives or USB devices to work, and these solutions may not offer the same protection as company owned and managed devices. Confidential information should therefore never be stored in employee-owned or commercial solutions.

Organizations should instead seek appropriate enterprise-level file storage solutions that meet industry and legal compliance requirements.

Depending on the industry and the strictness of its standards, these storage requirements will vary. Industries such as finance, healthcare, and insurance, for example, handle particularly sensitive information and are therefore subject to stringent, industry-specific standards regarding data storage.

Companies must shift to secure and reliable file storage solutions to protect their data, whether they need to meet the compliance requirements of a strictly regulated industry or not. This article will cover the benefits of enterprise-level software solutions for secure file storage.

1. Administrative controls to manage access and permissions

Regardless of your business type or industry, it is vital to maintain control over who can access what data. With a secure file storage solution, IT administrators have greater control over user permissions such as password protocols and encryption levels.

Secure file storage often includes multi-factor authentication (MFA), which is the use of personal identification numbers (PINs), passwords, fingerprints, and verification codes to access devices, systems, or files. This extra layer of protection reduces the risk of unauthorized access by up to 99%, thus limiting the potential for data exposure and loss.

Rather than providing shared credentials for groups of users, secure file storage uses individual credentials. This gives greater accountability to each user and helps reduce the risk of human error that can occur when certain access levels are not implemented.

Secure file storage and sharing also involve “least privilege access” models, which ensure each user has only the access privileges needed to complete their specific responsibilities. Through custom controls, administrators can also temporarily provide higher access controls on an as-needed basis. These access controls can immediately be revoked after task completion.

2. Industry-specific, military-Grade encryption and compliance

Employees may be familiar with commercial file sharing and storage solutions that are designed for user convenience. Although these solutions often provide appropriate storage for personal accounts, they lack purpose-built security controls regarding file backup and access.

These commercial-grade systems also typically lack the specific compliance features necessary in heavily regulated industries. Some of these common compliance regulations include the following:

  • Companies that handle cardholder data must comply with the Payment Card Industry Data Security Standard (PCI DSS). Requirements include practices such as managing access control, encrypting transmissions of cardholder data, strong password policies, and monitoring access to data and network resources.
  • Technology vendors and service providers are subject to audit under the Statement of Standards for Attestation Engagements 18 (SSAE 18). SSAE 18 informs Service Organization Control (SOC) reports, which address internal controls related to items such as data privacy, processing integrity, and system security.
  • Healthcare-related entities must comply with HIPAA rules regarding the protection of Electronic Protected Health Information (ePHI), which is all information that can identify an individual. Organizations must identify and protect against real and anticipated security threats to avoid unauthorized use of systems and unauthorized disclosure of personally identifying information.
  • Companies in the finance industry (or those that outsource finance-related operations to third-party vendors) must comply with System and Organization Controls (SOC). Certified Public Accountants (CPAs) utilize the SOC and its guidelines to ensure any outsourcing of data storage is compliant with industry standards.

Regardless of the industry and compliance measures, all industries should follow the military-grade encryption set forth by the Federal Information Processing Standards (FIPS). FIPS is the security standard for transmitting sensitive information.

Companies are deemed FIPS compliant when they adhere to defined data security and computer systems and encryption and decryption. Organizations may receive FIPS validation after undergoing a rigorous evaluation process.

3. Strong in-transit and at-rest encryption protocols

For heightened protection, all sensitive files should be encrypted. Encryption can be defined as the method of converting data into code that potential hackers cannot decipher. Encryption also supports regulatory compliance (for example, PCI DSS requires the encryption of card data when it is stored and when it is transmitted).

Files should be encrypted both in transit and at rest.

  • In transit protection protects data as it moves from one place to another, e.g., when data is sent via email.
  • At rest protection prevents cyberattackers from restoring a backup to an unsecured server, from making a copy of a database and its files, or from attaching these files to another unsecured server.

Off-the-shelf, consumer-level systems may provide some level of encryption; however, these systems often provide very little customization. This lack of agility can make these systems cumbersome for IT administrators who are already facing new challenges regarding system and data protection due to the increase in remote work and the subsequent increase in device types used.

Enterprise-level security systems offer custom solutions––such as password protocols and custom file read-write privileges––to address these critical security concerns.

4. Data backups to prevent loss

As backing up data becomes a crucial component of business technology practices, the volume of data storage (the means in which digital data is stored on computers or other devices) increases. Data storage is estimated to have increased from 260 million units in 2020 to 2.9 billion units in 2021 (one unit is equivalent to 1 million pieces of data).

A secure file storage system will automate business-critical tasks such as securing backups locally (and/or to the system’s cloud). Cloud-based file storage automates the backup process, while policies such as Windows Information Protection (WIP) help secure business data stored on both employee and company-owned devices.

IT admins can use WIP to add tags to corporate data that trigger automatic data encryption when files are downloaded from or saved to a company’s storage solution. These features help to reduce human errors, such as forgetting to back up data.

Enterprise-level storage solutions typically offer both on-site and cloud backups so that stored files are both secure and readily accessible to authorized users.

Building this redundancy into storage systems prevents data loss in the event of one method storage solution being compromised. Through features such as data monitoring and logging, company leaders can rest assured that their backups include all relevant data.

5. Long-term data retention requirements

Industry regulations may require that data be maintained for several years (or even for the duration of an individual’s life). Examples of industry-related data protection requirements include:

  • Health Insurance Portability and Accountability Act (HIPAA). HIPAA requires healthcare organizations to maintain some medical records for at least six years. Healthcare companies may also be subject to state laws regarding medical document retention.
  • Occupational Safety and Health Administration (OSHA). OSHA requires businesses to maintain employee records for at least seven years after an employee’s termination. It additionally requires employers to maintain medical exposure records for 30 years.
  • Sarbanes-Oxley Act (SOX). SOX requires all businesses to retain records––including electronic records such as files––for a minimum of five years.

Additionally, many data privacy and protection regulations—such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA)—have specific requirements regarding data retention that are not industry specific. It is therefore vital that organizations choose storage solutions that can safely maintain data long term.

Securely store files with WinZip Enterprise

To securely store their data, many businesses turn to enterprise technology systems such as WinZip®Enterprise. This solution protects data in transit and at rest via several different encryption methods, including the Federal Information Processing Standards (FIPS).

WinZip Enterprise provides FIPS 140-2 compliant security. Developed by the National Institute of Standards and Technology (NIST), FIPS 140-2 identifies security requirements for cryptographic modules to ensure protection of government’s sensitive data.

This solution also secures data backups with Advanced Encryption Standard (AES) 256-bit encryption. Although AES 256-bit encryption was initially developed for the US government in 1997, it is now available to businesses that require higher levels of data security.

WinZip Enterprise is a WIP enlightened application, which means IT can set custom storage access and use restrictions within the WIP policy. This both protects information and prevents data loss while empowering IT admins.

Additionally, to save storage space (and lower the ever rising costs of data storage and security), WinZip Enterprise finds and flags duplicate files. This helps to lessen the strain of capacity storage limits for businesses.

Discover the benefits of WinZip Enterprise to enable secure file storage within your organization.

  • Arrow Left
  • Go to page 1
  • Interim pages omitted …
  • Go to page 15
  • Go to page 16
  • Go to page 17
  • Go to page 18
  • Go to page 19
  • Go to page 20
  • Arrow Right

Learn more about WinZip Enterprise today!

Get a Quote

Connect With Us

  • Facebook
  • Twitter
  • YouTube

Copyright ©2023 Corel Corporation. All Rights Reserved. WinZip is a Registered Trademark of Corel Corporation