Christian Computers Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Christian Computers directly at (252) 321-6216.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Security Technology Tip of the Week Best Practices Privacy Business Management Cloud Business Computing Managed Service Provider Internet Microsoft Software Saving Money Workplace Tips Hosted Solutions Malware Hackers IT Services Backup Productivity Data Email Mobile Devices IT Support Small Business Hardware Business Computer Business Continuity Innovation Network Network Security Google Smartphones Managed IT Services Outsourced IT Productivity Server VoIP Efficiency Upgrade Data Backup Ransomware Social Media Communication Windows Disaster Recovery User Tips Vendor Management Tech Term Virtualization Smartphone Remote Monitoring Gadgets Microsoft Office Mobile Office Cloud Computing Quick Tips Mobile Device Management Data Recovery Android Windows 10 Internet of Things Save Money Unified Threat Management BYOD Paperless Office Holiday Miscellaneous Passwords Alert Data Management Bring Your Own Device Artificial Intelligence Best Practice Collaboration Users Encryption Apps Apple Browser Facebook Trending Phishing IT Support Going Green Firewall Managed IT App Mobile Computing Wireless Technology Mobile Device Office 365 Current Events Antivirus Maintenance Remote Computing Managed IT Services The Internet of Things Document Management Vulnerability Wi-Fi IT Solutions Operating System Recovery Cybersecurity Printer IT Consultant Health History Router Windows 10 Customer Relationship Management Gmail Robot File Sharing Applications Scam Information Technology Tech Support Automation Digital Payment Excel Password Content Filtering Risk Management WiFi Money Training VPN Hosted Solution Tablet Hard Drives Office Spam Big Data communications Employer-Employee Relationship Windows 8 Analytics BDR Wireless Downtime How To Fax Server Social Computer Repair Government Budget IT Management SaaS Proactive IT Work/Life Balance Hacker Data storage Point of Sale Bandwidth Help Desk Information Compliance Telephone Systems Healthcare Infrastructure Humor Computing Company Culture Politics Lithium-ion Battery Project Management Saving Time Two-factor Authentication Unified Communications IT Service Touchscreen Virtual Reality Net Neutrality Data Security Website Chrome Computers Virus Social Networking Outlook Word Samsung Machine Learning Inbound Marketing Twitter Avoiding Downtime Marketing Statistics Managed Service Storage Blockchain Education Printing Administration PowerPoint Customer Service Private Cloud Mouse Regulations Licensing Meetings Identity Theft Flexibility Augmented Reality USB Google Drive Access Control Save Time Search Webcam Physical Security Internet Exlporer Application Settings End of Support Co-Managed IT Software as a Service LiFi Uninterrupted Power Supply IoT Computer Care Upgrades Wearable Technology Virtual Private Network Conferencing Video Surveillance Files Bluetooth Smart Technology Business Technology Mobile Security IBM Remote Monitoring and Management G Suite Mobility Server Management Automobile Solid State Drive Display Hiring/Firing Piracy Remote Workers Cost Management How To Websites Sports Travel Data loss iPhone Management Office Tips Network Management Business Growth Employees Legal Chromebook HIPAA Taxes User Error Botnet Electronic Medical Records Heating/Cooling Monitors Phone System Alerts Recycling Assessment Patch Management Google Maps Networking Computing Infrastructure Asset Tracking Remote Worker Digital Writing Law Firm IT Black Friday Smart Tech Mobile Instant Messaging Windows 8.1 Update Fraud MSP Tech Terms Mobile Device Managment User Crowdsourcing Running Cable Motherboard PC Care Remote Support Hard Drive Cyberattacks Tip of the week Typing Development Backup and Disaster Recovery Error Disaster Cortana LinkedIn Mirgation Consulting Cleaning Consultation YouTube Dark Web Google Wallet Value Cooperation 3D Text Messaging OneNote ROI Web Server Hacking Spyware Retail Telephony Cyber Monday Connectivity Managing Stress Finance Trojan Scheduling Online Currency Emergency Proactive Theft Corporate Profile Memory Modem Leadership Work Station Cache Read Only Servers Cryptocurrency Cables Human Error Public Cloud Google Docs Black Market Best Available SharePoint Migration Managed Services Provider Data Warehousing Software Tips Drones Disaster Resistance Staff Employee-Employer Relationship Notes Cameras Refrigeration Social Engineering Debate Avoiding Downtown Enterprise Content Management Authentication Bitcoin Deep Learning Java Financial WannaCry Cybercrime Virtual Assistant People Technology Tips Cookies eWaste Wires Permission Processors Downloads Chatbots Phone Systems Star Wars E-Commerce Staffing Time Management 3D Printing Mail Merge Microsoft Excel Authorization Backups Update Streaming Media Data Breach Operations Professional Services CCTV CIO Programming Distributed Denial of Service Vulnerabilities IP Address Hacks Personal Information lenevo Hotspot Gaming Console WPA3 Procurement Virtual Desktop Network Congestion Law Enforcement Comparison Nanotechnology Bookmarks Supercomputer Test Administrator Hard Disk Drive Notifications Webinar Two-factorAuthentication Identity Utility Computing Features GPS Unsupported Software Address Geography Relocation Cabling Business Intelligence Data Loss Computer Accessories Firefox Macro Managed IT Service IT Budget Safety Shortcut Identities Superfish Language ebay Fleet Tracking Security Cameras Motion Sickness VoIP Gadget Print Server Specifications Screen Reader Enterprise Resource Planning Favorites Redundancy Permissions RMM Sync Dark Data Crowdfunding Multi-Factor Security Electronic Health Records Tracking Alt Codes Mobile Data Intranet High-Speed Internet Zero-Day Threat Emoji Skype Technology Laws IT Technicians Monitoring Break Fix Scary Stories Presentation Knowledge 5G CrashOverride Buisness Printers Experience Domains Laptop Wasting Time Public Speaking Fun Undo Halloween Regulation Competition