(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 January 2019
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Hackers Internet Productivity Google Malware Efficiency Miscellaneous Backup Smartphones Hosted Solutions Business Mobile Devices User Tips Software Network Security Business Management IT Support Android Email Hardware Workplace Tips IT Services Windows Browser Smartphone Innovation Holiday Microsoft Office Communication Communications Upgrade Windows 10 Productivity Social Media VoIP Save Money Network Cybersecurity Passwords Alert Computer Ransomware Data Business Continuity Office Marketing Tech Term Managed IT Services Employer-Employee Relationship Apple Small Business Remote Computing Server Managed Service Provider Automation Outsourced IT Quick Tips Virtualization Disaster Recovery Mobile Device Management Health Apps Big Data Internet of Things Mobile Device Hacking WiFi Saving Money Password IT Solutions The Internet of Things Bandwidth Data Backup Antivirus Mobile Computing Collaboration Going Green iPhone Wi-Fi Operating System Remote Monitoring Wireless History Chrome Router Office Tips Facebook IT Support Cloud Computing Gmail Application Gadgets Excel Networking Retail Windows 10 Applications Data Recovery Mobility Analytics App Computers Spam Artificial Intelligence Managed IT Services Data Management BYOD Maintenance PowerPoint Government Settings Tablet Cybercrime Law Enforcement Access Control Search... Twitter Business Intelligence Users Website Current Events VPN Physical Security Lithium-ion battery Biometrics Entertainment Google Drive Compliance VoIP Wireless Technology Recovery Safety Telephone Systems Proactive IT Mouse Sports Virus Workers Save Time Politics Company Culture Memory Office 365 Environment Data Breach Phishing Patch Management Information Social Engineering Battery Blockchain Word Online Currency Best Practice Licensing Hosted Solution Laptop User Error Outlook How To Remote Monitoring and Management BDR Bluetooth Smart Technology Managed IT Service HIPAA Tech Terms Managing Stress Avoiding Downtime Managed Service Cleaning Cortana Vulnerability DDoS Money Tech Support Budget Files Medical IT Robot Downtime End of Support Internet Exlporer Hiring/Firing Cost Management Data storage Printer Streaming Media Hard Drives Fax Server Printer Server Wireless Charging Connectivity Programming Phone System Two-factor Authentication Windows 8 Humor Customer Relationship Management Dark Web Scam Best Available People Education Wearable Technology Shortcut Virtual Assistant Tip of the week Information Technology Saving Time Data Protection Paperless Office Touchscreen Bring Your Own Device eWaste Plug-In Staffing Dongle File Sharing Telecommuting Authorization Spam Blocking Database Webcam IT budget Law Firm IT Hard Drive Healthcare Movies Automobile User Security Millennials Troubleshooting Email Management Cabling Tactics Touchpad IT Management WIndows 7 Running Cable Administration Processors Unified Communications Relocation Analysis Techology Technology Tips Human Resources Uninterrupted Power Supply Statistics Business Technology Update Internet Explorer Unified Threat Management Spyware Samsung Travel RAM SaaS Gadget HaaS Backup and Disaster Recovery Vendor Management Social Telephony Profitability Threat Google Maps Display Network Attached Storage HP Live Streaming Microsoft Teams Reporting Flexibility SSD Hacker Social Networking Sales Mobile Office Voice over IP Eliminating Downtime Printing Botnet Skype Black Market Computer Accessories Server Management Distributed Denial of Service Crowdfunding WhatsApp G Suite Legal Inventory Science Shadow IT Worker Commute Knowledge Meetings eCommerce Wireless Internet Multi-Factor Security Paper Managed IT Cameras Machine Learning Windows 8.1 Update Consultant News Hybrid Cloud Worker GDPR Mobile Security Net Neutrality Tablets Customer Service Debate Comparison Online Shopping Help Desk Ink LinkedIn Advertising Telecommute Workplace Telephone System Cables Storage Copy Video Games e-waste YouTube Specifications Risk Management Certification Monitor Document Management Private Cloud Data loss User Encryption Virtual Reality Voice over Internet Protocol Conferencing Error Paste Alerts disposal Windows XP NarrowBand IT Consultant Lead Generation Training Downloads Reputation Digital Access PDF Staff USB Notifications Bloatware Remote Support Content Filtering Microsoft Office 365 Work/Life Balance Value Spotify Analyitcs Chromecast Windows Media Player SharePoint Security Cameras Trends Video Surveillance Customers Edge Amazon Printers Websites Entrepreneur Trending Piracy User Tip Authentication Remote Control WannaCry Wearables A.I.

Mobile? Grab this Article!


Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...