631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.

Smartwatches Haven’t Become Much Smarter
Powerful Physical Security Options
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Microsoft Cybersecurity Malware Communication Tech Term Managed IT Services Communications Smartphones Google Efficiency Email Passwords Hackers Backup Business Hardware Data Software Business Management Internet Outsourced IT Hosted Solutions Small Business Ransomware Browser Innovation Windows 10 Android Collaboration IT Support IT Services Data Backup Users Data Recovery Mobile Devices Mobile Device VoIP Wi-Fi Save Money Microsoft Office Internet of Things Smartphone Network Social Media Holiday Alert Cloud Computing Applications Managed IT Services Computer Password Twitter Apps Workplace Tips Access Control Employer-Employee Relationship Miscellaneous Saving Money Bandwidth Wireless Business Intelligence Router BDR Chrome Blockchain Marketing Excel Gadgets Government Office Word Paperless Office Office 365 Data Management Automation Analytics VoIP Phishing Networking Virtualization Information Patch Management Settings Data Breach Vulnerability Business Continuity Tech Terms Connectivity Facebook Data Security Battery Dark Web Mobility Cortana Retail Virtual Assistant Managed Service Productivity App Tip of the week Remote Computing Virus VPN Hacking Workers Compliance Computers BYOD Website IT Support Cost Management Company Culture Artificial Intelligence Politics Remote Monitoring How To Law Enforcement Wireless Charging Spam WiFi Cybercrime Remote Monitoring and Management Data Protection Windows Mobile Device Management Physical Security Managed IT Service G Suite Gmail Scam Medical IT Telephony Google Maps Lead Generation Mobile Security Analysis Cryptocurrency Telephone Systems File Sharing Printer Server Outlook Files Bring Your Own Device Shortcut Amazon Remote Support Laptop Printing Entertainment Biometrics Authentication User Tip WhatsApp Spyware Disaster Recovery Tech Support GDPR Google Drive Comparison Data loss Unified Communications Recovery Voice over IP Operating System Maintenance Remote Control User Security Network Attached Storage Streaming Media Cleaning Printers Safety Profitability Technology Tips Hybrid Cloud CrashOverride E-Commerce Hosted Solution Paper Access Authorization Spotify Training HP Database Storage Specifications Staff RAM eCommerce WannaCry Environment Antivirus Time Management Spam Blocking Business Technology Hiring/Firing Server Management Downloads Eliminating Downtime Backup and Disaster Recovery Big Data Plug-In Payment Copy Apple Ink Personal Information Telecommuting Phone System Cables Security Cameras News Document Management Tactics Education Smart Technology Error Multi-Factor Security Conferencing Work/Life Balance Websites Microsoft Teams Wireless Internet Licensing Online Shopping HIPAA e-waste Chrome OS Email Management Sales Managed IT Trends Office Tips Automobile SSD Upgrade Proactive IT instant Messaging Paste iPhone Botnet IT budget PowerPoint SaaS Troubleshooting Millennials Managing Stress Voice over Internet Protocol Wearables Telephone System Digital Internet Explorer Touchscreen Content Filtering Help Desk Travel Hard Drive disposal Reporting Tablet Machine Learning A.I. Staffing Inventory Vulnerabilities Hard Drives IT Management Sports Update Dongle Gadget Healthcare Edge Threat Information Technology Microsoft Office 365 Certification Live Streaming Processors Value Two-factor Authentication Knowledge Server Telecommute Movies Printer Autocorrect HaaS Lithium-ion battery Augmented Reality Avoiding Downtime Wireless Technology 5G Dark Data Unified Threat Management Scheduling Samsung IBM Windows 7 Current Events The Internet of Things Managed Service Provider Leadership Hacker DDoS Budget Instagram Emergency Customer Relationship Management Money Computer Care Competition Net Neutrality IP Address Quick Tips Employer Employee Relationship Fun Freedom of Information Customer Service Regulation Gaming Console Mobile Office Scalability Domains Yahoo Synergy Encryption Video Games Worker Windows 10 IaaS Credit Cards Public Speaking Search Television Presentation Emoji Vendor Management

Newsletter Sign Up