301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Washington Works directly at 301-571-5040.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Business Email Software Network Security Tech Term Hosted Solutions Internet Data Data Backup Computer IT Support Data Recovery Mobile Devices Google Managed IT Services Efficiency Innovation Backup User Tips Ransomware IT Services Cloud Computing Business Management Microsoft Productivity Outsourced IT Workplace Tips Hardware Small Business Encryption Business Continuity Managed Service Provider Android Paperless Office Smartphone Windows 10 Office 365 Social Media Collaboration Remote Monitoring Phishing Browser Server Data Management Upgrade Save Money Managed IT Services Smartphones Windows 10 Communication Communications Disaster Recovery Bandwidth Cybersecurity VoIP Government Holiday Employer-Employee Relationship Unified Threat Management Apps Work/Life Balance BDR Document Management Facebook Infrastructure Tip of the week Automation Internet of Things Scam Risk Management Antivirus Compliance Windows Vulnerability Saving Money IT Management App Managed Service Information Quick Tips Business Technology Healthcare Wi-Fi Passwords Artificial Intelligence BYOD Money File Sharing Applications Chromebook Microsoft Office Customer Relationship Management Virtual Reality Big Data Vendor Management Network How To Blockchain Mobile Device SaaS VPN Maintenance Two-factor Authentication Hosted Solution Word Office Password Politics Chrome Training Remote Computing Mobile Security Hacker Websites Smart Technology Meetings Tablet Bring Your Own Device Patch Management Botnet Router Remote Monitoring and Management Website Automobile Employees Alert Data loss Remote Workers Health Machine Learning Identity Theft Gmail Company Culture Regulations How To Samsung Point of Sale Wireless Physical Security Twitter IoT Telephone Systems Mobile Device Management Electronic Medical Records Storage Computing Data Security G Suite Analytics Server Management Virtual Private Network Robot Firewall Professional Services Private Cloud Computer Care Downtime Access Control HIPAA Taxes Tech Support Social Management Recovery Development Authentication Digital IBM Mail Merge IT Solutions Cost Management USB Consulting Cabling Sports Software as a Service Mouse Identity Error Favorites WannaCry The Internet of Things Shortcut Virtualization Microsoft Excel Screen Reader Digital Payment OneNote Theft VoIP Techology Computer Repair Remote Worker SharePoint IT Consultant Unified Communications Proactive Permission Gadgets Firefox Budget Superfish Cooperation Cameras Enterprise Resource Planning Files Hard Disk Drive Bluetooth Staffing Cables Authorization Spyware Address Upgrades Processors Hotspot Assessment Dongle Managed Services Provider Search Wasting Time Project Management Monitors Smart Tech Cybercrime Employee-Employer Relationship Avoiding Downtime ROI Downloads IT Technicians Distributed Denial of Service Administrator Test Users Financial Unified Threat Management Staff Law Enforcement CCTV Mobile Read Only Wires Customer Service Language Internet Exlporer Webcam Service Level Agreement E-Commerce Disaster Heating/Cooling Database Comparison Vulnerabilities Conferencing Cortana Black Market Connectivity Time Management Notes Multi-Factor Security Mirgation Education Emoji Managed IT Service Modem WPA3 RMM Networking Crowdsourcing Procurement User Error Gadget Specifications WiFi Zero-Day Threat Spam Computing Infrastructure Value Utility Computing Features Uninterrupted Power Supply Servers Voice over Internet Protocol Geography Instant Messaging YouTube Permissions Travel Network Management PowerPoint Google Calendar Relocation Cleaning Managed IT Break Fix Cookies Supercomputer Fleet Tracking Operating System Personal Information Security Cameras Printer Wearable Technology Managing Stress Help Desk Black Friday Social Networking GPS Backup and Disaster Recovery Alerts Electronic Health Records Update Net Neutrality High-Speed Internet Finance Settings Fraud Star Wars Motion Sickness Monitoring IT Support Touchscreen Legal Virtual Assistant Legislation Chatbots Corporate Profile Outlook Augmented Reality Dark Web Nanotechnology IT Budget Asset Tracking Tech Terms Google Drive Printing Enterprise Content Management Bookmarks Windows 7 Cyber Monday Motherboard Office Tips Tracking MSP Human Error Lenovo Notifications Licensing Web Server Cyberattacks Solid State Drive Statistics Safety Marketing Hard Drives Competition IP Address CrashOverride Miscellaneous Mobile Office Printers Domains Emergency Hiring/Firing Public Speaking Regulation Presentation Lithium-ion battery Fun Wireless Technology 5G