631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.

Smartwatches Haven’t Become Much Smarter
Powerful Physical Security Options


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity Cybersecurity User Tips Malware Managed IT Services Tech Term Backup Smartphones Microsoft Communications Hackers Efficiency Hardware Internet Passwords Communication Android Browser Outsourced IT Hosted Solutions Business Ransomware Email Small Business Software Business Management Google Mobile Device Data Backup Data Recovery VoIP Wi-Fi Alert Microsoft Office Innovation Save Money Social Media Windows 10 Cloud Computing Applications Smartphone Internet of Things IT Services Data Network Collaboration IT Support Holiday Access Control Router Managed IT Services Users Password Miscellaneous Saving Money Twitter Wireless Business Intelligence Mobile Devices Computer Employer-Employee Relationship Apps Bandwidth Gadgets Workplace Tips Blockchain Word Business Continuity Data Breach Networking Settings Excel Patch Management Government Office Vulnerability Information Data Management Automation Analytics BDR Phishing Virtualization VoIP Marketing Virtual Assistant Virus Managed Service WiFi Cybercrime Windows Scam Compliance Website Office 365 Computers Battery How To Cortana Facebook Retail Artificial Intelligence App Spam Wireless Charging Physical Security Managed IT Service Hacking Mobile Device Management Data Protection Gmail Workers VPN Remote Monitoring and Management Paperless Office BYOD Cost Management IT Support Dark Web Medical IT Remote Monitoring Company Culture Tech Terms Connectivity Politics Law Enforcement Productivity Tip of the week Remote Computing Mobility Chrome Profitability Hard Drives Staffing Operating System Network Attached Storage Streaming Media Specifications Technology Tips Hybrid Cloud eCommerce Paper Spam Blocking Business Technology Authorization Staff RAM Big Data Telecommuting Training Server Gadget HP Database Copy Apple Storage Information Technology Eliminating Downtime WannaCry Environment News Google Maps Server Management Downloads Multi-Factor Security Conferencing Printer Server Backup and Disaster Recovery Licensing Online Shopping Plug-In Ink Email Management Sales Websites Microsoft Teams Upgrade Millennials Cables Security Cameras Shortcut Document Management Tactics Paste iPhone Error Entertainment Biometrics Content Filtering Wireless Internet Recovery HIPAA e-waste Telephone System Disaster Recovery Trends Cleaning Printers SSD Travel Proactive IT Spotify Maintenance IT budget PowerPoint Tablet Troubleshooting Access Managing Stress Voice over Internet Protocol Wearables CrashOverride Digital Internet Explorer Touchscreen Help Desk Hiring/Firing Hard Drive disposal Reporting Machine Learning A.I. Inventory Two-factor Authentication Live Streaming Antivirus IT Management Sports Knowledge Update Dongle G Suite Files Telephony Healthcare Work/Life Balance Edge Threat Telephone Systems File Sharing Microsoft Office 365 User Tip Certification Managed IT Phone System Processors Value Remote Support Education Smart Technology Telecommute Movies Outlook Botnet Lead Generation Mobile Security Tech Support WhatsApp Analysis Office Tips Automobile Google Drive Comparison SaaS Bring Your Own Device Voice over IP Amazon Data Security Laptop Printing Safety Remote Control User Security Authentication Unified Communications Spyware Hosted Solution GDPR Data loss Video Games Budget Synergy IaaS Customer Relationship Management Emergency Worker Competition Search Vendor Management Credit Cards IP Address Television Autocorrect Emoji HaaS Customer Service Avoiding Downtime Printer Quick Tips Scheduling Mobile Office Dark Data Regulation Samsung Unified Threat Management Domains Managed Service Provider Leadership Windows 10 Instagram Current Events DDoS Money Public Speaking Computer Care Employer Employee Relationship Presentation Personal Information Net Neutrality Lithium-ion battery Fun Augmented Reality Freedom of Information Gaming Console Wireless Technology 5G IBM The Internet of Things Encryption Scalability Hacker Yahoo

Newsletter Sign Up