(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 June 2019
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Hackers Google Malware Internet Efficiency Productivity Miscellaneous Smartphones Business User Tips Backup Mobile Devices Network Security Software Hosted Solutions Innovation Communication Hardware Business Management Productivity Email Smartphone Data Android Workplace Tips IT Services IT Support Communications Browser Microsoft Office Windows Upgrade Holiday Social Media VoIP Passwords Windows 10 Ransomware Network Save Money Cybersecurity Computer Office Alert Business Continuity Mobile Device Employer-Employee Relationship Managed IT Services Small Business Marketing Outsourced IT Tech Term Managed Service Provider Windows 10 Apps Apple Remote Computing Server Disaster Recovery Chrome Health Quick Tips Bandwidth Automation IT Support Virtualization Mobile Device Management Internet of Things Collaboration Gadgets Big Data Managed IT Services Hacking Data Backup Saving Money Applications IT Solutions WiFi Wi-Fi The Internet of Things Users Wireless Antivirus Mobile Computing Going Green iPhone Password Facebook Operating System Remote Monitoring Gmail History App Data Recovery Computers Application Router Excel Office Tips Networking Retail Analytics Cloud Computing Mobility Cybercrime Settings Law Enforcement Access Control Current Events VPN Twitter Artificial Intelligence Maintenance Office 365 Website Spam Tablet BYOD Business Intelligence PowerPoint Company Culture Physical Security Information Data Management Government Search... Workers Politics Social Engineering Managed Service Phishing Data Breach Lithium-ion battery Wireless Technology Environment Entertainment Patch Management Proactive IT Compliance Sports Paperless Office Mouse Word Virus Battery Net Neutrality Biometrics Save Time Google Drive Value VoIP Memory Recovery Safety Blockchain Telephone Systems Printer Server Saving Time DDoS Healthcare Remote Monitoring and Management BDR Touchscreen Phone System Programming Tech Support Customer Relationship Management Humor Online Currency Files People Data Security Robot Cost Management Education Tech Terms End of Support Bluetooth Customer Service Internet Exlporer Data storage Streaming Media Fax Server Wireless Charging Scam Licensing Outlook G Suite Two-factor Authentication Medical IT Dark Web Human Resources Shortcut Virtual Assistant Tip of the week Avoiding Downtime Data Protection Managing Stress Information Technology Bring Your Own Device Money eWaste Connectivity Voice over Internet Protocol Budget Smart Technology Best Practice How To Hosted Solution Laptop User Error Downtime Managed IT Service Windows 8 Hiring/Firing Best Available Printer HIPAA Cortana Telephony Hard Drives Vulnerability Wearable Technology Cleaning Authorization Live Streaming Database Video Surveillance Movies User IT budget Sales Electronic Health Records Social Networking Voice over IP Managed IT Flexibility Black Market Mobile Office Troubleshooting WhatsApp Tactics Unified Communications USB IT Management Distributed Denial of Service Knowledge Employees eCommerce Analysis Analyitcs Multi-Factor Security Technology Tips Windows Media Player Legal Shadow IT Law Firm IT Meetings Update News Internet Explorer Worker RAM Trending E-Commerce Comparison Online Shopping Solid State Drive Backup and Disaster Recovery Piracy Profitability Telephone System Threat Microsoft Teams Copy Network Attached Storage Windows XP Advertising Payment Specifications Hard Disk Drive Reporting SSD Video Games YouTube Monitor Risk Management Eliminating Downtime Printing Paste Server Management Spotify Private Cloud Encryption instant Messaging Virtual Reality Conferencing Lead Generation Video Inventory Alerts Display NarrowBand Administration Reputation Wireless Internet Remote Support Paper WIndows 7 Access Hybrid Cloud Machine Learning PDF Statistics Notifications Vulnerabilities Bloatware Content Filtering OneNote GDPR Mobile Security Skype Unified Threat Management Work/Life Balance Chromecast HP Customers Samsung SharePoint Help Desk Ink Printers Cables Remote Control Telecommute Vendor Management Webcam Cryptocurrency Entrepreneur User Tip WannaCry Windows Server 2008 R2 Storage e-waste Automobile Document Management Windows 8.1 Update Certification File Sharing Staffing Telecommuting Hacker Spam Blocking Data loss Windows 7 Hard Drive Taskbar Error disposal LinkedIn Computer Accessories Digital Crowdfunding Training User Security Downloads Millennials Science Email Management Staff Worker Commute Time Management Touchpad Processors National Security Microsoft Office 365 Cameras Personal Information Cabling Consultant Edge Relocation Running Cable Security Cameras Business Technology Trends Amazon Tablets Websites Google Maps Techology Debate Uninterrupted Power Supply Chrome OS IT Consultant Spyware Authentication Travel SaaS Gadget Workplace Wearables A.I. Employee-Employer Relationship Social Plug-In Dongle Botnet HaaS

Mobile? Grab this Article!


Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...