Contact Us Today! 1300 968 748

Partner IT Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Partner IT directly at 1300 968 748.

Prioritize the Protection of Your Google Account
VoIP Is the Leading Choice for Business Communicat...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 24 March 2019

Captcha Image

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Technology Cloud Outsourced IT Business Computing Managed IT Services Data Backup Best Practices Software Malware IT Support Data Recovery Tip of the Week Innovation Hosted Solutions Productivity IT Services Small Business VoIP Email Cloud Computing Productivity Network Security Hackers Internet Managed IT Social Media Hardware Business Managed Service Provider Disaster Recovery Remote Monitoring Paperless Office Privacy Backup Data Internet of Things Save Money Business Continuity Vendor Management Project Management Tech Term Communications Customer Relationship Management Upgrade Mobile Devices BDR Telephone Systems Unified Threat Management Saving Money Compliance Efficiency Document Management Ransomware Business Management Managed IT Services Content Filtering Collaboration File Sharing Cybersecurity Analytics Remote Monitoring and Management Files Mobility Taxes Assessment Windows 10 IT Service Mobile Device Bandwidth Applications Firewall Net Neutrality Healthcare Data Management SaaS Communication Software as a Service Redundancy Recovery Phishing Passwords Computer Proactive IP Telephony History Multi-Factor Security Cortana Enterprise Resource Planning Storage Social Networking Cables Mobile Device Management Wi-Fi Downtime VPN Private Cloud Fraud Gadgets IoT Microsoft Office Operations How To Printing Data Warehousing Office 365 Data loss Antivirus Mobile Smart Technology Motherboard Automation Wires Hacker Chrome Sync Business Growth Vulnerabilities Data Security Virtual Assistant Unified Communications Remote Workers Telephony Employer-Employee Relationship Botnet Business Technology Remote Worker Twitter WPA3 Holiday Infrastructure Hacking Employees Company Culture Data Storage Bookmarks Migration Mobile Computing Google Managed Service Information Technology Licensing Meetings Supercomputer Browser Mobile Device Managment Mail Merge Geography Virus IT Consultant Artificial Intelligence The Internet of Things Utility Computing Information IT Support Consultation Robot Fleet Tracking Facebook App Trending Zero-Day Threat Virtualization Favorites Procurement Router User Tips NBN Software Tips Notifications Electronic Health Records Address Regulations Computers High-Speed Internet Public Cloud Help Desk Techology Unified Threat Management Smartphone Risk Management Patch Management Travel Remote Computing Asset Tracking Network Evernote Uninterrupted Power Supply Backup and Disaster Recovery Conferencing Microsoft MSP SIP Statistics Two-factor Authentication Management Cyberattacks Two-Factor Digital Payment USB Smartphones BYOD Voice over Internet Protocol Internet Exlporer Cost Management Training Identity Theft Vulnerability Scam Permissions Android Word Technology Tips Flexibility Point of Sale Budget Virtual Reality G Suite Security Cameras Dark Web Website Black Market Gadget Monitors Bluetooth Authentication Alerts Read Only Tech Terms Cyber Monday Apps Crowdsourcing Tip of the week Windows 7 Printer Marketing Hard Drive Health Managed Services Provider Chromebook CCTV Apple Google Drive Networking Professional Services IT Consulting Processors Employee-Employer Relationship Politics GPS Spyware Office Tips Solid State Drive Permission Mouse Websites Money Emergency Cookies Cleaning Automobile Cabling Authorization Google Calendar Cooperation Hacks Printers Theft Server Windows Heating/Cooling Access Control Mobile Security Cache E-Commerce Virtual Private Network Error Customer Service Time Management Data Breach Users Star Wars Alert Tracking Encryption Hard Disk Drive Outlook Test Computing Wearable Technology Wireless Microsoft Excel Nanotechnology Computer Care VoIP Service-based Business Legislation Staff Financial Distributed Denial of Service Workplace Tips IBM Avoiding Downtime Servers SharePoint Hotspot Recycling Features Comparison HIPAA Google Maps Network Management Wasting Time Technology Laws Samsung CrashOverride Administrator Shortcut RMM Web Server Machine Learning Cybercrime Lenovo ROI Screen Reader Staffing YouTube Disaster Gmail Managing Stress Managed IT Service Chatbots Regulation Work/Life Balance Corporate Profile Server Management Instant Messaging Downloads Language eWaste Motion Sickness Big Data IT Budget Firefox Specifications IT Technicians Government Touchscreen Database Monitoring Electronic Medical Records Cameras Office IT Management Superfish Notes Disaster Resistance Blockchain Smart Tech Settings Augmented Reality Enterprise Content Management Social Break Fix Identity Modem Law Enforcement WannaCry Finance Computing Infrastructure Tech Support Password Black Friday Mirgation Spam Development Education Windows 10 User Error Hosted Solution Consulting How To Maintenance Operating System Physical Security Relocation Tablet Quick Tips PowerPoint Proactive IT Connectivity OneNote WiFi Digital Search Human Error Bring Your Own Device