Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Central Technology Solutions directly at 1-844-237-4300.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Hosted Solutions Hackers Internet IT Services Network Security Productivity Outsourced IT Managed IT Services Software Data IT Support Data Backup Business Productivity Mobile Devices Ransomware Innovation Tech Term Computer Hardware Microsoft Data Recovery Backup Small Business Google Cloud Computing Internet of Things Smartphone Managed Service Provider Business Continuity Disaster Recovery Smartphones Android Efficiency Data Management Remote Monitoring Social Media Windows 10 Managed IT Artificial Intelligence User Tips Communication Browser VoIP Encryption Paperless Office Windows Business Management Save Money Facebook BYOD IT Support Upgrade Holiday App Collaboration Mobile Device Windows 10 Cybersecurity Risk Management Workplace Tips Mobile Device Management Phishing Firewall Applications Government Unified Threat Management communications Wi-Fi Network Robot Bring Your Own Device Server Managed IT Services Saving Money BDR Bandwidth Employer-Employee Relationship Passwords Gmail Recovery Virtualization Vulnerability Document Management Big Data Chrome Money IT Management Compliance Data storage Going Green Telephone Systems Tip of the week SaaS Scam Hosted Solution Vendor Management Project Management Antivirus Wireless Website Password Office 365 Apps Healthcare Infrastructure Content Filtering Data Security Data loss Apple Politics Help Desk Social Customer Service Work/Life Balance Managed Service Two-factor Authentication Information Router Virtual Reality Unified Communications Computing Miscellaneous Training Quick Tips Regulations Printing Office IT Service Blockchain File Sharing Computers Microsoft Office Customer Relationship Management Storage Analytics Remote Computing Files Automation Remote Monitoring and Management Network Management Business Growth How To Samsung Assessment Business Technology Private Cloud Sports Flexibility Mobile Computing Tech Support Remote Workers Server Management Chromebook How To Avoiding Downtime Hacker Digital Payment Uninterrupted Power Supply The Internet of Things Websites IoT Identity Theft Wireless Technology Legal Upgrades Maintenance Users Smart Technology Licensing Spam Word Twitter Redundancy WiFi Employees YouTube Budget Company Culture Downtime End of Support Health Information Technology Internet Exlporer Machine Learning HIPAA Mobility Administration Operating System Outlook Access Control Education Monitors Mouse LiFi VPN Mobile Security Electronic Medical Records Tablet Patch Management Alert IT solutions Google Drive Settings Virtual Private Network Unified Threat Management Hotspot Taxes Theft Google Wallet Black Friday Roanoke — Central Technology Solutions Management Google Maps Dark Data Personal Information Mirgation Cost Management IT Budget E-Commerce Disaster Trending Safety Hard Drives Google Docs Fraud Screen Reader Wires Human Error Mail Merge Humor Downloads Augmented Reality Connectivity Marketing Technology Laws Dark Web Motherboard Vulnerabilities Cabling Authentication Notifications Backups User Error Language WPA3 Financial Gadgets Touchscreen Techology Drones Cyber Monday technology services provider Enterprise Resource Planning Bookmarks Buisness VoIP Sponsor Consultation Lenovo Deep Learning Software as a Service Migration Hard Drive Features Solid State Drive Black Market Point of Sale Smart Tech Permission Address Current Events Operations Statistics Writing Emoji Data Warehousing Geography Authorization Telephony Computing Infrastructure Fleet Tracking Procurement Disaster Resistance Network Congestion Alt Codes Sync Technology Assurance Group ’s 18 Mobile Favorites Digital Obstacle Test Superfish Computer Repair Technology Tips Public Cloud Chatbots Cache Electronic Health Records Search Security Cameras Cryptocurrency Law Enforcement Net Neutrality Physical Security Multi-Factor Security Botnet Wearable Technology Star Wars Monitoring Bluetooth Retail Cortana Microsoft Excel Travel Modem High-Speed Internet 3D Printing Hacks Printer Alerts Asset Tracking Proactive IT Display Typing Distributed Denial of Service Mobile Device Managment Annual Convention Software Tips Conferencing Spyware Course MSP RMM Best Practice Comparison Automobile Identity Recycling Computer Care Cyberattacks Shortcut Remote Worker Bitcoin Processors Gadget Firefox Office Tips Google Calendar Utility Computing Consulting Cookies Development Zero-Day Threat Unsupported Software Virus Cooperation GPS OneNote Heating/Cooling IT Consulting Update Managed IT Service San Diego Managing Stress Instant Messaging Proactive Tech Terms Virtual Desktop Time Management Networking Specifications eWaste Read Only WannaCry ROI Windows 8 Save Time Legislation IT Technicians Supercomputer Managed Services Provider Hacking Social Engineering Identities USB Crowdsourcing Permissions Meetings Nanotechnology Cables Backup and Disaster Recovery Mobile Data SharePoint Staff Tracking Employee-Employer Relationship Servers Data Breach Break Fix G Suite Social Networking Enterprise Content Management History Finance Printers Notes Webcam IT Consultant Error Cybercrime Web Server Regulation Cameras Hard Disk Drive Motion Sickness CCTV Administrator Emergency Relocation CrashOverride