Get Started Today!  321-259-5500

croom new

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to TotalCareIT™ directly at 321-259-5500.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Internet Email Hosted Solutions IT Services Productivity Data Computer Backup Network Security Mobile Devices Productivity Hardware Microsoft Software Google Ransomware Workplace Tips User Tips Efficiency Managed Service Provider Windows 10 Tech Term Smartphone Android Innovation Server Business Continuity Cloud Computing Disaster Recovery Small Business Encryption Business Management Smartphones IT Support Data Management IT Support Communication Upgrade Social Media Managed IT Services Browser Data Backup Network Phishing App Outsourced IT Windows Artificial Intelligence Office 365 BYOD Facebook Data Recovery Big Data Paperless Office Passwords Gmail Employer-Employee Relationship Windows 10 Office Apps Internet of Things WiFi Hosted Solution Mobile Device Management Holiday VoIP Vendor Management Collaboration Managed IT Services Microsoft Office Save Money Remote Monitoring Government Office Tips Firewall Wireless Technology Alert Cybersecurity communications Recovery Wireless Spam Robot Wi-Fi Vulnerability Risk Management Two-factor Authentication Saving Money Chrome Miscellaneous Virtualization Budget Work/Life Balance Avoiding Downtime Managed Service Scam Analytics IT solutions Website Hacker Document Management Automation IT Management Content Filtering Customer Service Bandwidth Quick Tips Infrastructure VPN How To Tip of the week Money Antivirus Password Word Settings Social Computing Blockchain Storage Information Downtime Unified Threat Management Cybercrime Remote Computing Machine Learning Healthcare Customer Relationship Management Compliance Tablet Applications BDR Data storage Virtual Reality Apple Going Green Hard Drives Business Technology Politics Legal Education SaaS Maintenance Bring Your Own Device Mobile Device IT service Twitter Tech Support The Internet of Things Physical Security Botnet Augmented Reality Router Automobile Chromebook IBM How To Server Management Net Neutrality Google Drive Network Management Cost Management Monitors Virtual Desktop Cortana Access Control HIPAA Patch Management Data loss YouTube Networking Samsung Unified Communications Business Intelligence Computer Care Regulations Lithium-ion battery Best Practice Identity Theft Computers Solid State Drive Data Security Hacking Training User Error Private Cloud Search File Sharing LiFi Mobile Security Business Owner End of Support Competition Virtual Private Network Users Outlook Management G Suite Sports Heating/Cooling User Health Point of Sale Printing eWaste Upgrades Websites Telephone Systems Administration Running Cable Taxes Safety Mouse Operating System Electronic Medical Records Presentation Wires Financial GPS Time Management Cyber Monday Smart Tech Printers Motion Sickness Uninterrupted Power Supply Deep Learning Superfish Language Display Processors Hacks Google Calendar Environment Chatbots 3D Printing Features Hiring/Firing Address Managing Stress Permission IT Consultant Buisness Wearable Technology Wasting Time Digital Payment Co-managed IT Save Time Shortcut Managed IT Hard Drive Authorization Cameras WannaCry Laptop Alt Codes Printer Security Cameras Tracking Information Technology Smart Technology Connectivity Bookmarks Hard Disk Drive Computing Infrastructure Trending Legislation Identity Unsupported Software Application Fun Modem Administrator Permissions Analyitcs Dark Data Emoji Enterprise Content Management Test Cleaning Firefox Law Enforcement Monitoring FCC iPhone Google Docs Help Desk Cache Employees CCTV Halloween Typing ROI Touchscreen Google Wallet Database Statistics Distributed Denial of Service Backups Personal Information IoT Favorites Meetings Identities Alerts CIO Current Events Comparison Troubleshooting Mobile Data Relocation Cookies Electronic Health Records Cabling Marketing Fraud Vulnerabilities RMM SharePoint Gadget Law Consulting Gadgets Title II Recycling Remote Monitoring and Management Digital Scary Stories Cryptocurrency IP Address OneNote Notes Drones Voice over Internet Protocol Bluetooth Managed IT Service Computer Repair Undo Star Wars Instant Messaging Webcam Mobile Computing Licensing Writing Notifications Specifications Social Networking Nanotechnology Files Knowledge Black Market Development Tech Terms Downloads IT Technicians Entrepreneur 5G Managed Services Provider Google Maps Online Public Speaking Zero-Day Threat Spyware Bitcoin Crowdsourcing Mobile Office Employee-Employer Relationship PowerPoint Supercomputer Windows 7 Break Fix Assessment Finance Techology Cooperation Retail Staffing VoIP Black Friday Refrigeration Screen Reader Read Only Travel Disaster Experience Lenovo Hotspot Network Congestion Cables Theft Multi-Factor Security Mirgation Motherboard E-Commerce Error Mail Merge Microsoft Excel Humor Update Company Culture Human Error Windows 8 Social Engineering Remote Workers Professional Services IT Budget Servers Dark Web Internet Exlporer Authentication Web Server Corporate Profile Business Growth Unified Threat Management Staff Teamwork Shared resources Regulation Emergency USB Domains Flexibility CrashOverride Students

      Latest Blog Entry

      If your business is one that depends on transportation, you know that coordination is extremely important. With consumers’ reliance on a company’s distribution arm, today’s companies are turning old practices on their heads and utilizing a more technology-driven approach to ...

      Account Login