Blog
  • Register

Endpoint I.T. Blog

Tip of the Week: Protect Your Word Document with a Password

Tip of the Week: Protect Your Word Document with a Password

Some documents contain more sensitive data on them than others, making them important to protect. When it won’t do to have documents containing boatloads of sensitive data available to anyone who obtains the document, you can turn to Microsoft Word to have a feature that protects them: password protection.

Not All Documents Require Protection
Granted, not every single document your business produces will be important enough to protect. For example, the memo to tell everyone to stop eating each other’s lunches out of the employee fridge certainly isn’t as valuable as a sheet of contact information for an important client. Depending on the business and the type of data it works with, even a simple text file could contain valuable information.

Microsoft Word gives your business the chance to protect documents with a password, effectively restricting access to only those who know the password. This gives you the opportunity to protect documents so they can be reviewed or collaborated on only by authorized users.

Adding a Password
To add a password to a document, follow these steps:

  • Under the File tab, select Info.
  • Select the Protect Document button. Use the Encrypt with Password option in the drop-down menu. You’ll see the option to Encrypt it.
  • In the space provided, enter the password you want to use. Keep in mind that these passwords are case-sensitive and cannot be recovered if they are forgotten (again, consider this before implementing the password). Once you’re done, click OK and confirm your password by typing it one more time. Complete the process by clicking OK once more.

Your Word document will now be locked behind a password. This process will work in both Microsoft Word 2016 or Microsoft Office 365. You can also remove the password from the file by following the same steps above until the Encrypt dialog box. You’ll see the password you chose in the space. All you have to do is delete it and press OK.

Did you find this tip helpful? Be sure to let us know in the comments, and subscribe to our blog for the latest tips and tricks.

Smartwatches Haven’t Become Much Smarter
Powerful Physical Security Options
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Privacy User Tips Tech Term Productivity Cybersecurity Smartphones Internet Cloud Malware Microsoft Backup Efficiency Android Communication Browser Hardware Communications Google Email Wi-Fi IT Support Mobile Device Data Backup Ransomware IT Services Passwords Network Software Data Small Business Data Recovery VoIp Managed IT services Social Media Outsourced IT Collaboration Holiday Business Mobile Devices Business Management Managed IT Services Cloud Computing Applications Internet of Things Innovation Windows 10 Hackers Hosted Solutions Wireless Smartphone Users Saving Money Business Intelligence Word Router Workplace Tips Miscellaneous Networking Patch Management Settings Computer Information Access Control Marketing Microsoft Office Employer-Employee Relationship Blockchain Managed Service Wireless Charging Virtual Assistant Battery Tech Terms Business Continuity Apps Computers Mobility Compliance Automation How To Data Breach Virtualization Phishing Artificial Intelligence Physical Security Save Money Government Password Excel Managed IT Service Cost Management Virus Remote Computing Website Cortana Bandwidth Data Protection Remote Monitoring and Management Medical IT Chrome Law Enforcement VPN Gmail Analytics BDR Data Management Tip of the week Twitter Connectivity Dark Web Scam Paper Botnet Technology Tips Company Culture File Sharing Eliminating Downtime Safety Movies Microsoft Office 365 Voice over IP Tactics Specifications Data loss GDPR Workers Mobile Security Travel disposal Voice over Internet Protocol Tablet Spyware Ink Remote Monitoring User Tip Big Data Backup and Disaster Recovery Vulnerability Managing Stress User Security BYOD Conferencing Edge Authentication Troubleshooting Network Attached Storage Maintenance Plug-In News HP Spam Files Streaming Media Storage Millennials IT budget Operating System Managed IT Education Value WhatsApp Knowledge Training PowerPoint Hard Drives G Suite Business Technology Wireless Internet WannaCry Telephone System Office Dongle Unified Communications Authorization eCommerce Update Server Retail Internet Explorer Proactive IT Document Management Antivirus Politics Downloads Error Live Streaming Security Cameras Sports Reporting Remote Support Laptop SSD Licensing Bring Your Own Device Help Desk HIPAA Machine Learning Cleaning Content Filtering VoIP RAM Online Shopping Outlook Gadgets Threat Wearables Paperless Office Staff Trends Apple Office 365 IT Management Database Amazon App Telecommuting Facebook Tech Support Environment Hybrid Cloud Upgrade Hard Drive Analysis Alert Microsoft Teams Profitability Lead Generation Server Management Printing Healthcare Digital Websites A.I. Touchscreen iPhone Telephony Cybercrime Comparison SaaS Inventory e-waste Cables Sales Certification Processors Telecommute Emergency Printers Data Security WiFi Personal Information Thank You Regulation Congratulations Quick Tips Disaster Recovery

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at http://www.endpointtx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701