(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 March 2019
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Hackers Google Internet Productivity Malware Efficiency Miscellaneous Smartphones Backup Mobile Devices Business Hosted Solutions User Tips Software Network Security Email Business Management Innovation Hardware Android Workplace Tips IT Services IT Support Communication Browser Smartphone Windows Productivity Communications Holiday Microsoft Office Data Upgrade Passwords Social Media VoIP Windows 10 Save Money Cybersecurity Network Alert Computer Ransomware Managed IT Services Office Tech Term Marketing Business Continuity Apple Small Business Remote Computing Employer-Employee Relationship Server Managed Service Provider Outsourced IT Automation Quick Tips Virtualization Disaster Recovery Hacking Apps Windows 10 Chrome Internet of Things Collaboration Health Mobile Device Big Data Mobile Device Management Data Backup IT Solutions Password Facebook The Internet of Things Antivirus Wi-Fi Mobile Computing Going Green WiFi iPhone Operating System Remote Monitoring History Bandwidth Wireless Saving Money Router Office Tips Mobility App Applications Gmail Gadgets Data Recovery Computers Users Analytics Managed IT Services Application IT Support Excel Networking Cloud Computing Retail Maintenance Access Control Data Management Search... Tablet Government Twitter Cybercrime Settings Law Enforcement Website Spam Business Intelligence BYOD Office 365 PowerPoint VPN Current Events Artificial Intelligence Physical Security Workers Biometrics Google Drive Wireless Technology Politics Proactive IT Sports Recovery Safety Telephone Systems Phishing Data Breach Social Engineering Company Culture Patch Management Lithium-ion battery Entertainment Paperless Office Compliance Information Word Environment Mouse Virus Blockchain VoIP Save Time Battery Memory Best Practice Tech Terms Hiring/Firing Hosted Solution Printer Laptop Managed Service User Error Hard Drives Printer Server Cost Management Phone System Programming Customer Relationship Management HIPAA G Suite Humor Medical IT People Cleaning Education Wireless Charging DDoS Scam Tech Support Files Dark Web Licensing Robot Connectivity Outlook Virtual Assistant End of Support Tip of the week Data Protection Internet Exlporer Data storage Streaming Media Best Available Fax Server Windows 8 Managing Stress Avoiding Downtime Smart Technology Wearable Technology How To Two-factor Authentication Money Saving Time Budget Touchscreen Shortcut Managed IT Service BDR Online Currency Remote Monitoring and Management Information Technology Downtime Data Security Cortana Bring Your Own Device Vulnerability eWaste Bluetooth Update Tablets Internet Explorer Live Streaming Debate E-Commerce RAM Sales Voice over IP Backup and Disaster Recovery Workplace Managed IT Profitability Threat WhatsApp Touchpad Network Attached Storage Payment Cabling Microsoft Teams Knowledge Reporting eCommerce User Relocation SSD Multi-Factor Security Running Cable Display Eliminating Downtime Techology Printing News Uninterrupted Power Supply Worker Server Management instant Messaging Comparison Online Shopping USB Inventory Skype Social Wireless Internet Analyitcs HaaS Paper Telephone System Windows Media Player Machine Learning Copy Windows XP Vulnerabilities Hybrid Cloud Specifications GDPR Mobile Security Trending Piracy Social Networking Help Desk Flexibility Ink HP Black Market Telecommute Paste Mobile Office Spotify Windows 8.1 Update Cryptocurrency Cables Conferencing Storage Lead Generation e-waste Distributed Denial of Service Net Neutrality LinkedIn Certification Legal Remote Support Shadow IT Document Management Access Data loss Meetings Time Management Voice over Internet Protocol Content Filtering Error disposal Customer Service Training Downloads Digital Printers User Tip WIndows 7 Staff Remote Control Administration Webcam Chrome OS Microsoft Office 365 WannaCry Human Resources Advertising Value Automobile Statistics Staffing Security Cameras IT Consultant Video Games Trends File Sharing Unified Threat Management YouTube Edge Telecommuting Monitor Websites Spam Blocking Risk Management Samsung Amazon Authentication Hard Drive Private Cloud Vendor Management Encryption Virtual Reality Video Surveillance Wearables Alerts A.I. User Security NarrowBand Millennials Reputation Dongle Email Management Plug-In Authorization Processors Hacker PDF Database Notifications Personal Information Bloatware Healthcare Work/Life Balance Movies Business Technology Computer Accessories Chromecast IT budget Customers SharePoint Google Maps Crowdfunding Troubleshooting Spyware Science Tactics Travel Worker Commute SaaS Entrepreneur Gadget Law Firm IT Unified Communications Cameras IT Management Telephony Consultant Technology Tips Botnet Analysis

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...