Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Central Technology Solutions directly at 1-844-237-4300.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Data Productivity Network Security Productivity Managed IT Services Outsourced IT Software Data Backup IT Support Business Mobile Devices Innovation Data Recovery Ransomware Tech Term Computer Microsoft Hardware Small Business Google Backup Cloud Computing Business Continuity Internet of Things Smartphone Efficiency Managed Service Provider Remote Monitoring Android Business Management Upgrade Disaster Recovery Windows 10 VoIP IT Support Smartphones Data Management Encryption Paperless Office Social Media User Tips Artificial Intelligence Phishing Windows Workplace Tips Browser Managed IT Communication Save Money Cybersecurity BYOD Windows 10 Facebook Risk Management Collaboration Mobile Device Management Mobile Device Server App communications Holiday Saving Money Wi-Fi Apps Firewall Passwords Gmail Robot Compliance BDR Managed IT Services Network Bring Your Own Device Office 365 Vendor Management Applications Employer-Employee Relationship Automation Recovery Government Bandwidth Unified Threat Management Document Management Vulnerability Business Technology Managed Service Information Content Filtering SaaS Telephone Systems IT Management Money Data storage Big Data Going Green Tip of the week Chrome Quick Tips Scam Microsoft Office Project Management Antivirus Healthcare Wireless Virtualization Password Hosted Solution Infrastructure Analytics Website Work/Life Balance Help Desk Data Security Data loss Customer Service Virtual Reality Apple Social Miscellaneous Training Blockchain Regulations File Sharing Office IT Service Computing Tablet Computers Unified Communications Storage Files VPN Printing Customer Relationship Management Politics Two-factor Authentication Remote Computing Router Education Maintenance Avoiding Downtime Network Management Remote Workers Digital Payment LiFi Smart Technology Settings Net Neutrality Assessment Websites Identity Theft Business Growth How To IT solutions Server Management Licensing Mobile Computing IoT Upgrades Internet Exlporer Hacker Twitter Uninterrupted Power Supply Sports HIPAA Employees Access Control Wireless Technology Legal Mobile Security End of Support Health Machine Learning Mobility Word Company Culture Redundancy Monitors Users Electronic Medical Records Alert Budget Spam Information Technology WiFi YouTube Operating System Outlook Private Cloud Downtime How To Samsung Mouse Patch Management The Internet of Things Remote Monitoring and Management Tech Support Software as a Service Management Google Drive Virtual Private Network Administration Chromebook Flexibility Vulnerabilities Authentication Point of Sale Computing Infrastructure Connectivity Technology Assurance Group ’s 18 Notifications Virtual Desktop WPA3 Financial Technology Tips Chatbots Black Market Google Wallet Disaster Trending Enterprise Resource Planning Bookmarks Database Hard Drives Google Docs Mail Merge Permission Telephony Multi-Factor Security Wearable Technology Writing Emoji Technology Laws Hard Drive Features Notes Sync Microsoft Excel Modem VoIP Sponsor Geography Authorization Law Enforcement Printer Alerts Network Congestion Humor Touchscreen Techology Public Cloud Distributed Denial of Service Annual Convention Travel Computer Repair Backups Consultation Lenovo Fleet Tracking Procurement Botnet Comparison Identity Drones Mobile Favorites Voice over Internet Protocol Cookies Physical Security Solid State Drive Address Test Google Calendar Retail Deep Learning Cortana Statistics Cache Electronic Health Records PowerPoint Mobile Device Managment Software Tips Digital Obstacle High-Speed Internet Gadget Marketing Cooperation Display Current Events Disaster Resistance Star Wars Monitoring Automobile Computer Care Managed IT Service San Diego 3D Printing Windows 7 Gadgets Superfish Asset Tracking Buisness Specifications Alt Codes Processors Search Conferencing Permissions Nanotechnology Office Tips Cryptocurrency MSP RMM GPS Legislation IT Technicians Bluetooth Recycling Cyberattacks Professional Services Spyware Course Development Zero-Day Threat SharePoint Staff Update Proactive IT Utility Computing Consulting Security Cameras Break Fix Social Networking Unsupported Software Virus Instant Messaging Crowdsourcing Meetings Unified Threat Management Hotspot Hacks OneNote Supercomputer Black Friday Roanoke — Central Technology Solutions Typing Shortcut Managing Stress Fraud Screen Reader Bitcoin Firefox Proactive Tech Terms Tracking Mirgation Social Engineering Best Practice USB eWaste Read Only Virtual Assistant G Suite History Cables Backup and Disaster Recovery Taxes Downloads Augmented Reality Heating/Cooling IT Consulting Managed Services Provider Remote Worker Google Maps Dark Web Motherboard Mobile Data Enterprise Content Management Finance User Error Language Time Management Networking Employee-Employer Relationship IT Budget Cyber Monday technology services provider WannaCry Cabling Smart Tech Dark Data Personal Information Windows 8 Save Time Theft Migration Safety Hacking Wasting Time Wires Human Error Operations Servers Data Breach Cost Management E-Commerce ROI Data Warehousing Identities Error Cybercrime Web Server Regulation Cameras Motion Sickness CCTV Administrator Relocation Hard Disk Drive Webcam Emergency Printers CrashOverride IT Consultant