You most likely already know that data encryption is one of the best protection tactics out there. So we put together a list of 9 free encryption software tools that you can use right away.

Once you set it up, this protection layer will keep your valuable data safe from data breaches and online criminals.

If you’re advanced and ready to get to business, you can skip this part (click here to get to the list of tools).

But I thought it would be useful to share some details for those who are just getting started with encryption.

Encryption tools are very useful in keeping valuable information hidden from cyber criminals, because it renders the data inaccessible to prying eyes. We recommend you use some sort of encryption every time you access personal or confidential information, no matter if you store it locally, on your PC, or send it over the Internet.

Using encryption has become an issue of public interest ever since the Edward Snowden revelations. And to Snowden to owe a huge progress in this matter, as even the US’s Director of National Intelligence admitted: as a direct consequence of the Snowden leaks, the spread of encryption was advanced by 7 years!

But what exactly is data encryption?

Encryption is a process that transforms accessible data or information into an unintelligible code that cannot be read or understood by normal means.

The encryption process uses a key and an algorithm to turn the accessible data into an encoded piece of information.

To decode the encrypted data and render it back to its original form (that can be easily understood), one needs access to the ciphering algorithm and the secret key that was used.


The purpose of encryption is to secure sensitive information from cyber criminals or other online threats. At the same time, it’s a method that can be used to archive large amounts of data or to secure private communication over the Internet.

The 9 Free Encryption Tools You Can Start Using Today

So while security analysts around the globe try to find the best solutions to ensure privacy, let’s focus on how you can encrypt your files without losing speed of access and usability.

Use strong passwords for your online accounts

We could jump directly to the best ways to encrypt your files, but encrypting files isn’t that helpful if it’s based on a weak password. When setting up your encryption process, you’ll be asked to choose a password that will act like the decryption key. So your encryption is only as good as your password.

That’s why you need to make sure we use strong passwords, which contain different character types, like uppercase and lowercase letters and numbers, and are more than 15 characters long. There are even several ways you can test if your passwords are strong enough.

Also, you’ll need to set passwords which are not easy to remember or guess, and which aren’t used for more than one online account.

It may sound like a hassle and you’re probably asking yourself:

But how exactly am I supposed to do this, when I have so many online accounts?

For most users, the “solution” is to simply use the same credentials. But this an incredibly poor choice.

As we mentioned, if a malicious hacker discovers the password you use for one online account, he’ll easily be able to use the same credentials to access all the other accounts where you reused that password. So NEVER, EVER reuse your passwords!

1. LastPass

LastPass Password Generator

To protect your passwords and increase your online safety, we recommend a password manager like LastPass. Using a password manager means you’ll only need to remember one password, the one you use to access LastPass.

LastPass provides extensions for the main web browsers, like Mozilla Firefox and Google Chrome, so it’s easy to use.

When you create a new online account, it immediately provides the option to save the new credentials.

This password managers (and others like it) also encourages you to set an unique and hard to break password and discourages password reuse. If you’re using the same password for multiple accounts, it simply recommends selecting a different password.

Managing passwords safely can really become much easier if you follow the steps in this guide and if you use two-factor authentication whenever it’s available.

Encrypt Your Hard Drive

2. BitLocker


There is a large number of encryption tools available out there, which can be used to encrypt data locally. For most users, the easiest way to encrypt sensitive information or maybe the entire hard-disk is to use Microsoft’s BitLocker software, which is installed on most Windows operating systems.

What exactly is BitLocker?

BitLocker is a full-disk encryption tool incorporated in the latest Windows operating systems, which supports AES (128 and 256-bit) encryption (military grade).

What is AES encryption used by most security software?

The Advanced Encryption Standard has been tested and improved and is now used worldwide by most security vendors due to its high level of security and optimization.

Why we recommend you use BitLocker

Simply put, because it’s easy to use and it’s already integrated into your Windows operating system.

BitLocker Drive Encryption is mainly a tool you can use to prevent data breaches and data ex-filtration from your hard disk. That’s because BitLocker encrypts the entire drive, which makes it impossible for anyone stealing your laptop to remove the hard drive and read the files. It’s a also a good safeguard if you should lose your PC.

It’s also good to know that, if you have BitLocker Drive Encryption activated, when you add new files, BitLocker will encrypt them automatically.

You can find more in-depth resources about BitLocker in our security guide dedicated to Windows 10.

3. VeraCrypt

We were ready to recommend TrueCrypt, but since they ended support and development in 2014, VeraCrypt became a great alternative to use.

VeraCrypt is free and it’s available for Windows, OS X and Linux operating systems. If you’re used to TrueCrypt, then you will have no problem in using VeraCrypt.

This solution supports Advanced Encryption Standard too and can hide encrypted volumes within other volumes.

veracrypt screenshot

Though some people are still using TrueCrypt, we recommend that you switch to VeraCrypt. That’s because this tool is still supported, so it constantly gets improvements and security enhancements as part of its updates.

Though VeraCrypt does not support TrueCrypt files, you can convert them to its own format. Plus, you can use this dedicated beginner’s guide to get started.

Encrypt Your Files

4. 7Zip


There are many users that don’t want to encrypt the entire hard disk, but only specific files and documents that include valuable data or information. This is especially the case for stuff you need to send over the Internet.

7Zip is a powerful and lightweight solution whose main asset is simplicity. As many users noticed, 7Zip is capable of extracting most archives and it features strong AES-256 encryption.

The program is easy to get used to when encrypting your own files and it uses one of the best compression formats. It’s also available in 87 languages and compatible with even the oldest of Windows versions, plus Linux.

5. AxCrypt


Like 7Zip, AxCrypt is a lightweight free encryption tool that integrates with Windows. You can use it mainly for protecting valuable files from the system.

The files can be encrypted for a specific period of time and can auto-decrypt later on, when that file reaches the destination. It’s a fast tool that enables you to select an entire folder or a group of files and encrypt them fast.

As I mentioned at the beginning, its main purpose is to protect specific files and not entire hard drives, although it does offer protection against major cracking methods used by cyber criminals. Plus, you can use it to encrypt your sensitive data before backing it up in the cloud or on external hard drives.

If you’re looking for even more tools and programs that you can use to encrypt computer hard drives or your sensitive data, this list is a great resource to explore!

Encrypt your Online Traffic

Encryption for private files is not enough. To increase your overall protection, you need to make sure no one can eavesdrop on your communication over the web.

So, how can I increase my online security without creating too many barriers that may slow down my access to information posted online?

I have listed below a few simple tools you can use to access online content and stay safe from privacy breaches at the same time. Two birds, one stone.

6. Access secure websites that use encryption mechanisms

To make sure you always access secure web pages, you can use a browser extension like HTTPS Everywhere, which works on Mozilla Firefox, Opera and Google Chrome.

Though some security analysts argue that even secure websites aren’t bulletproof, it’s much better than doing nothing. After all, these secure websites use some encryption and authentication standards that are meant to ensure the confidentiality of your online activities.

When you use HTTPS Everywhere, your browser will go through an authentication process while connecting to a secure website. This process uses cryptography to verify that a secure connection is maintained.

Using a little extension like HTTPS Everywhere, which encrypts your communication with major websites, will make your online activities more secure from the dangers of cybercrime.

7. Tor Browser – Access the Anonymity Network

What If I want even more protection and online privacy?

If you want something close to complete privacy, you can use the Tor browser. This allows you to access Internet anonymously using the Tor network of computers.

The special Tor browser has been designed to be used by anyone who wants to conceal any browsing activity from prying eyes.

The most recent version of this browser, Tor Browser 6.0, has been recently released and it features many changes and improvements, both in terms of stability and privacy.

But, what exactly is Tor?

Tor is the short version of “The Onion Router” and it is the browser you just read about, but also stands for the anonymity network. Here’s a useful summary from Wikipedia:

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

how tor works

The number of computers in the network become a highly effective layer of protection that conceals the user identity.

For more information on Tor browser, see this article.

Elements of insecurity

You may have heard already about cases where Tor anonymity network has been used for malicious purposes (especially in ransomware attacks).

And there are a high number of articles which show how this anonymity network is being used by online criminals to hide their communication from law enforcement agencies or to promote their exploit kits-as-a-service business.

We understand you may see some connections between your online browsing and criminal activities, but as Tor network representatives mention, they simply want to provide the same privacy privileges that cyber criminals already access.

8. Virtual Private Network – Encrypt Your Communication

Are there more alternatives for becoming anonymous online?


To connect in complete privacy to any online location in the world, you can use a VPN, which is a Virtual Private Network.

This private network is able to spread across the normal Internet space, using its resources to create an encrypted channel that can keep your communication safe from interception attempts.

Usually, employees who work remotely use a VPN to access the private company network. This way, they can run online operations or transfer highly confidential documents in complete privacy.

But that doesn’t mean VPN software is just for corporate users. I recommend you use this type of software when connecting to unsafe public networks or when you want to access content whose distribution is restricted to a certain geographical area.

Therefore, if you choose to use VPN software, you can ensure that your web traffic and valuable information remain encrypted. Cyber criminals won’t be able to sniff the data you exchange online and collect sensitive info such as passwords and usernames, credit card details and more.

To keep your online session private over the Internet and be safe from cyber attacks, use a popular VPN solution like CyberGhost. I’ve been using it myself for almost two years and I’m very happy with it.

9. Online Proxy Server – Hide Your IP Address

If you don’t want to go through the process of finding and installing a VPN or the Tor browser, you can still rely on a basic privacy measure: an online proxy server.

Using a proxy server, you can simply hide your IP address and surf online accessing websites anonymously.

Keep in mind that a web proxy server can’t offer the encryption channel you get from a VPN solution and can’t hide your online communication through an entire network like Tor. But you’ll still have an indirect link between your computer and the website you access. This should provide baseline protection for small browsing activities.

If you’re a Windows 10 user and want to see how you can set up a proxy, these instructions can come in handy.

Encryption is not enough

To keep your valuable information safe from cyber criminals, encryption is not enough. In our blogposts, we often emphasize that no single security solution is enough.

The cyber criminals’ arsenal includes a lot of weapons that we need to shield our systems from. Since there are so many dangers online, there are a few more things you can do to improve your onlinse security:

  • Keep your browser and operating system updated with the latest security patches. Make sure you have the latest versions running on your system. Online criminals spread malicious tools by using security exploits to take advantage from your system’s vulnerabilities. Patching is key, as the experts said it again and again.
  • Use a reliable security solution from a trusted company. To keep your system safe from the latest threats, the software should include a real-time traffic scanning engine. This ensures that every connection to and from the Internet is scanned for threats. Start with an antivirus, but don’t forget that it, too, is not enough.
  • Be careful when connecting to public and free wireless networks. One of the favorite methods used by online criminals to retrieve your credentials is to use wireless sniffers to access data you send over unprotected networks.


Information security is strongly connected to data management. That’s why we all need to acknowledge that one software solution will never be able to cover all our security and privacy needs.

When you think about encryption, consider its role in your overall security strategy: it’s a great, reliable way to ensure that your personal information doesn’t get harvested by cyber criminals when you go online.

How do you see encryption in the bigger picture of Internet security? Are you using any type of encryption for your data at the moment?

Share your thoughts and I’d be happy to update the list with more useful recommendations.

* This article was initially published by Aurelian Neagu in March 2015 and updated by Andra Zaharia in June 2016.

Improve your Online Privacy

11 Steps to Dramatically Improve your Online Privacy in Less than 1 Hour [Updated]


Netiquette: Definition and 10 Basic Rules To Dramatically Improve your Safety [Updated]

best encrypted messaging apps
2016.06.09 SLOW READ

The Best Encrypted Messaging Apps You Can (and Should) Use Today


Thank you very much for sharing this

veraCrypt not supporting TrueCrypt files, why?

On my side bit lockers works fine, Thanks for sharing in-detail. I also some interesting new tools on comment section.

Thank you very much, Andra! Extremely helpful and very practical. Appreciated.

Thank you for providing this useful post which is really helpful for me in encryption side. Your article was quite awesome to read.

I am developing web service using IBM iseries server and components and I want to allow user to call web service to get information.
do you know, how do we encrypt data before sending it over web to web client? do we need to encrypt / decrypt data programatically?

Hi Andra,

I am developing web service using IBM iseries server and components and I want to allow user to call web service to get information.
do you know, how do we encrypt data before sending it over web to web client? do we need to encrypt / decrypt data programatically?


Hi Atul!

Sorry, but I can’t provide advice on such topics, because I don’t know the situation and we don’t do consultancy. But I’m sure you will find the best fit for your needs. Best of luck!

Which of your recommendations, or some other specific alternative, can be used on Windows 7 ?
And do any of your recommendations require a recipient (of an encrypted emailing that I send) to have compatible decryption software in order for the recipient to read the emailing?
Can the copies of all past emails already existing in my computer be changed to encrypted format? How? Using what?

I don’t understand this

What specific things did you find difficult to understand, Jimmy?

oops, scuze, am uitat. Aplicatia de care am nevoie este pentru criptare / decriptare asimetrica. Thanks!

Very interesting, thank you a lot! May I a question? I need an open source app for linux to encrypt/decrypt and sign/verify using a token, I have an epass3000 from Feitian. Can you make me any suggestion about this? Many thanks, gab

it a good website but can i know what the best tool for encrypt the blog?

Would there be any advantage to compressing everything before encrypting it?

Hi Jerry! Compressing your filed before encrypting them will help the encryption process go faster, because encrypting smaller files requires less resources. Also, compression can add a entropy, which is helpful against known-plaintext attacks.

Great Article, thank you 🙂 🙂

i’m still using TrueCrypt ….. itz amazing….

and you are so beautiful 🙂

It’s really important to encrypt your internet traffic, and the tools you have mentioned pretty interesting but how we encrypt your internet traffic is really interesting as well.

I think everyone should know such information like you have described on this post. On this software tools are very software developers including me. Just the minute before i use Tor browser to check my website full report and very easily to get. It is really a great and useful piece of info.

There are also online encrypting tools such as SPOCOT:

Alexandra Klimovich on July 29, 2016 at 2:35 pm

Dear Andra, thank you for the post. There is one more tool that achieves your security goals but skips your description: WinGPG, absolutely free open source encryption soft. It would be great if you add it to your list and try out. It operates on gpg/pgp with simple yet powerful GUI. It’s manageable and easy to use so anyone could get use of it. . The link to the product: Thank you!

Thanks a bunch for the suggestion, Alexandra!

I’ll take a look and see if we can include it in the list.

Alexandra Klimovich on August 11, 2016 at 10:41 am

Sounds terrific! Thank you very much)

I downloaded both the 32-bit and 64-bit portable versions, and looked at the maximum length of the key for each app. It was a paltry 3072-bit! I have already read about how someone has cracked 4096-bit PGP keys, so anything less than that is not worth my consideration.

@other human: Not cracked! All they did was listen to one CPU’s crystal and decrypted one key. I bet it took them months to get the key. By that time I would have moved the file to a whole new computer that uses a new encrypted password. So, you would have to decrypt the new computers password and then enter in the files key.

Great write up! I am currrently using axcrypt but i think i am moving on to Cloakapps soon. Much more convenient because i dont have to remember any passwords and the UI is just clean IMO. And Cloakapps is free. Win.

Your article was quite awesome to read. Thank you andra for providing this useful post which is really helpful for me in encryption side.

So glad you found this guide useful, Anjana! I hope you’ll have time to explore some other security guides we published as well.

I agree, Anjana. I design encryption courseware (for both business & academic audiences). You knowledge and writing style demonstrate that you are a good educator. You have a knack for zoning in on the critical or less understood issues and making them clear. Great job!

Shahryaar Rehman on July 1, 2016 at 2:03 pm

Best Encryption Tool for a Secured Digital Life

Most all of this article was new to me and thus very useful. Thank you. Under the discussion of passwords there was not any mention of two step authentication. By default Google at the time I set it up had this turned off by default. Now I see it used by my bank and several others. It is a little off the topic here, but could be put under the Last Pass section. How much security does this method have and is there anything that can be done to make it more or less secure?

Hi Rich!

Thanks for your feedback. We actually have an entire guide focused on just that:

And I just updated the article to include a link to that and our guide on password management:

Thanks again for your comment! Really appreciated.

Maybe you can try Cloak Apps ( Cloak app is a file encryption tool while Vault offers user controlled file distribution. It works on Mac, Android, Windows and iOS. Check it out.

Mikhail Tchervonenko on September 23, 2015 at 2:09 pm

I recommend to try the free backup software with encryption and compression CopyMik

You can use Tsafe for protect your files
For more information visit our web site

Update: The current version of VeraCrypt (1.0f) does support import of TrueCrypt files.

Agree… I was about to say the same thing. But you don’t want to turn on that feature when encrypting new files. It should be used only for decrypting OLD Truecrypt files.

Leave a Reply

Your email address will not be published. Required fields are marked *

175 queries in 0.972 seconds