• Register

Endpoint I.T. Blog

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.

Smartwatches Haven’t Become Much Smarter
Powerful Physical Security Options


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, March 21, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Network Security Productivity User Tips Microsoft Tech Term Google Smartphones Cloud Cybersecurity Malware Email Efficiency Data Communication Internet Hardware Passwords Android Backup Communications Browser Windows 10 IT Services Mobile Devices Software Wi-Fi IT Support Innovation Mobile Device Users Data Backup Ransomware Outsourced IT Business Hackers VoIp Collaboration Network Business Management Managed IT Services Small Business Data Recovery Applications Workplace Tips Hosted Solutions Wireless Managed IT services Social Media Cloud Computing Holiday Smartphone Internet of Things Saving Money Word Router Miscellaneous Chrome Networking Microsoft Office Employer-Employee Relationship Settings Computer Marketing Access Control Information Patch Management Blockchain Business Intelligence Tech Terms Remote Computing Cortana Mobility Business Continuity Data Protection Battery Connectivity Computers Automation Office 365 Managed Service Virtualization How To Apps Gmail Artificial Intelligence Compliance Password Physical Security Save Money Wireless Charging Cost Management G Suite Bandwidth Website Paperless Office Data Breach VPN Facebook Phishing Remote Monitoring and Management Analytics BDR Law Enforcement Data Management Government Medical IT Tip of the week Virtual Assistant Excel Managed IT Service Twitter Virus Dark Web Scam Data Security Remote Support Cybercrime Safety A.I. Touchscreen Cryptocurrency e-waste Cables Spyware Data loss Online Shopping BYOD SaaS Cleaning Content Filtering Mobile Security Company Culture Apple Troubleshooting Paper Big Data Backup and Disaster Recovery Travel Personal Information Network Attached Storage Telecommuting Tactics Edge Vulnerability Training Movies Microsoft Office 365 disposal Voice over Internet Protocol HP Spam Wireless Internet GDPR IT budget Operating System E-Commerce Managing Stress WannaCry iPhone Telephony Files Update Ink Comparison Hard Drives Managed IT Education Server Maintenance Plug-In Sales Dongle Security Cameras Authentication Retail Time Management Value Document Management File Sharing Antivirus Help Desk Streaming Media Storage Botnet Payment HIPAA Machine Learning Voice over IP Politics Outlook PowerPoint Laptop Specifications SSD Live Streaming Unified Communications Authorization Workers Internet Explorer Proactive IT Tablet Licensing Wearables User Tip Gadgets Chrome OS User Security Staff VoIP Upgrade Downloads Error Remote Monitoring IT Management instant Messaging Bring Your Own Device Hard Drive Profitability Sports Reporting News Conferencing RAM Lead Generation Server Management Millennials App Threat WhatsApp Knowledge Tech Support Healthcare Database Amazon Digital Business Technology Websites Alert Certification Trends Vulnerabilities Environment Hybrid Cloud Processors Telecommute eCommerce Eliminating Downtime Telephone System Office Inventory Microsoft Teams Printing Analysis Technology Tips Emergency Printers Thank You Windows 7 Congratulations WiFi Regulation Quick Tips Disaster Recovery

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701