{"id":48802,"date":"2022-10-05T21:03:27","date_gmt":"2022-10-05T21:03:27","guid":{"rendered":"http:\/\/4ba6705d-b390-471b-ac3e-b736c4b01cc0"},"modified":"2022-10-05T21:03:27","modified_gmt":"2022-10-05T21:03:27","slug":"how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/","title":{"rendered":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0a222c7737c1a0a240b0f6f8e2b7aa18ca3507f2\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=768\" alt=\"Half closed MacBook Pro.\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/88c81cd1c4c8c18efd9f8061a6fe6ce557605146\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1024\" alt=\"Half closed MacBook Pro.\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\" alt=\"Half closed MacBook Pro.\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\" alt=\"Half closed MacBook Pro.\" height=\"899.9236835410836\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Jason Cipriani\/CNET<\/span><\/figcaption><\/figure>\n<p>You probably have sensitive data on your MacBook or iMac. That data might live in a folder that contains various files with company secrets or your own personal information. Unencrypted, that folder can be viewed by anyone with access to your desktop or laptop.&nbsp;<\/p>\n<p>However, if you encrypt that folder, only those with the decryption password are able to access the contents within.<\/p>\n<p>You can achieve folder encryption with a third-party application, but there&#8217;s also a built-in tool that can do this for you. Said tool is Disk Utility, and it makes encrypting existing folders on your MacOS machine very easy.<\/p>\n<p>The caveat to the method I will outline is that it creates an encrypted image from the folder and leaves the original intact. On top of this, once you&#8217;ve created the encrypted image, you cannot add new items to it. Because of this, the method is really best suited for either encrypted backups or encrypting folders that will not need to be changed.<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-encryption-software\/\" rel=\"follow\"><strong>The best encryption software: Protect your data<\/strong><\/a><\/p>\n<h2>How to encrypt a folder in MacOS to keep sensitive data from prying eyes&nbsp;<\/h2>\n<p>Let me show you how it&#8217;s done.<\/p>\n<h2>Requirements<\/h2>\n<p>The only thing you&#8217;ll need for this is an updated version of MacOS running on either a MacBook or iMac. I&#8217;ll be demonstrating on a <span class=\"c-commerceLink\"><a href=\"https:\/\/apple.sjv.io\/c\/159047\/435031\/7613?&amp;sharedId=zdnet&amp;u=https%3A%2F%2Fwww.apple.com%2Fmacbook-pro%2F%3Fafid%3Dp238%257CsnI1xuxFs-dc_mtid_1870765e38482_pcrid_626304509644_pgrid_122213034143_pntwk_g_pchan__pexid__%26cid%3Daos-us-kwgo-mac--slid---product-&amp;subId1=[subid_value]\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>MacBook Pro<\/span><!----><\/a><\/span> with an Apple Silicone M1 chip and MacOS Monterey (v 12.6). I would highly recommend you test out this process on a folder that doesn&#8217;t contain any important documents. Once you know how to successfully encrypt folders, you can then do so with those folders that do contain important information.<\/p>\n<div id=\"0903ffe2-e01d-45cd-b811-03b93e48cbbf\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_content\"><!----> <!----> <!----> <\/p>\n<div readability=\"7\">\n<div class=\"c-ShortcodeContent\" readability=\"34\">\n<p>Click the Launchpad icon on your Dock and type Disk Utility. When the Disk Utility launcher appears, click it to open the app.<\/p>\n<\/div>\n<\/div>\n<p> <!----> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"d85f51c8-6604-459b-89de-7a11ee849f91\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_content\"><!----> <!----> <!----> <\/p>\n<div readability=\"7.5\">\n<div class=\"c-ShortcodeContent\" readability=\"35\">\n<p>With Disk Utility open click File &gt; New Image &gt; Image from Folder. When the folder picker popup appears, navigate to and select the folder you want to encrypt, and click Choose.<\/p>\n<\/div>\n<\/div>\n<p> <!----> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\" alt=\"The Disk Utility File menu in MacOS Monterey.\" height=\"256.42737896494157\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Creating a new encrypted image from a folder in MacOS.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Jack Wallen\/ZDNET<\/span><\/figcaption><\/figure>\n<div id=\"f8b3d928-d28a-40b9-876d-8559dd50fc66\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_content\"><!----> <!----> <!----> <\/p>\n<div readability=\"9.3612334801762\">\n<div class=\"c-ShortcodeContent\" readability=\"37.444933920705\">\n<p>In the resulting popup window, do the following:<\/p>\n<ul>\n<li>Name the encrypted folder.<\/li>\n<li>Add any tags you might want to include.<\/li>\n<li>Select either 128-bit or 256-bit encryption (that latter is stronger).<\/li>\n<li>Click Save.<\/li>\n<\/ul>\n<p>When you select the encryption type, you&#8217;ll be prompted to type and verify an encryption password. Make sure this <a href=\"https:\/\/www.zdnet.com\/article\/dont-use-these-passwords-these-are-the-most-popular-log-in-details-found-for-sale-online\/\" rel=\"follow\">password is strong and unique<\/a> (and not the same as your user password).<\/p>\n<p>Disk Utility will then encrypt the folder. When it completes, click Done.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\" alt=\"The image creation popup window in MacOS Monterey.\" height=\"758.1818181818182\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Make sure to give your new encrypted image a unique name.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Jack Wallen\/ZDNET <\/span><\/figcaption><\/figure>\n<h2>How to access files within the encrypted image<\/h2>\n<p>Open Finder and navigate to the folder housing the encrypted image. If you double-click on that image (it&#8217;ll end in .img), you&#8217;ll be prompted for the password you added during the image creation. Upon successful authentication, Finder will open the image and you can access the contents within.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/how-to-create-a-new-macos-finder-quick-action-with-automator\/\" rel=\"follow\"><strong>How to create a new MacOS Finder Quick Action with Automator<\/strong><\/a>&nbsp;<\/p>\n<p>And that is all there is to create an encrypted folder in MacOS with Disk Utility. Although this option is somewhat limited, it is a good way to keep sensitive information from prying eyes. And if you have no need to add new files and folders to the encrypted image, you can feel free to delete the original folder, so the data contained within cannot be accessed without going through the encrypted image.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can achieve folder encryption with a third-party application, but there&#8217;s also a built-in tool that can do this for you.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48802","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T21:03:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to encrypt a folder in MacOS to keep sensitive data from prying eyes\",\"datePublished\":\"2022-10-05T21:03:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\",\"name\":\"How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-10-05T21:03:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to encrypt a folder in MacOS to keep sensitive data from prying eyes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/","og_locale":"en_US","og_type":"article","og_title":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-05T21:03:27+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes","datePublished":"2022-10-05T21:03:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/"},"wordCount":602,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/","name":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200","datePublished":"2022-10-05T21:03:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7ecac8c1e21d658e04d5dee185f85e39b4a6adbe\/2020\/11\/16\/8b1bf56e-0de6-40e6-a290-de3d248ba0c7\/apple-macbook-pro-m1-2020-2.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-encrypt-a-folder-in-macos-to-keep-sensitive-data-from-prying-eyes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How to encrypt a folder in MacOS to keep sensitive data from prying eyes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48802"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48802\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}