301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Washington Works directly at 301-571-5040.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Productivity Business Network Security Email Software Tech Term Hosted Solutions Internet Data Backup Mobile Devices Computer Data Managed IT Services Backup Ransomware Google IT Support User Tips Data Recovery Microsoft Productivity Outsourced IT Innovation Efficiency Hardware Cloud Computing Managed Service Provider IT Services Small Business Smartphone Encryption Business Continuity Workplace Tips Business Management Social Media Paperless Office Android Remote Monitoring Browser Data Management Office 365 Save Money Managed IT Services Smartphones Windows 10 Collaboration Communication Windows 10 Server Disaster Recovery Bandwidth Holiday Government Infrastructure Tip of the week Communications Work/Life Balance Antivirus Facebook Scam Vulnerability Healthcare IT Management Cybersecurity App VoIP Wi-Fi Artificial Intelligence BDR Passwords Unified Threat Management Phishing Internet of Things Employer-Employee Relationship BYOD Compliance Document Management Blockchain Customer Relationship Management Money Managed Service Big Data Chromebook Virtual Reality Windows Information Network Mobile Device Upgrade Saving Money Risk Management How To Quick Tips Maintenance SaaS Word Two-factor Authentication Applications Politics Hosted Solution Chrome Office Apps Password File Sharing Employees Recovery Hacker Social Meetings Remote Workers Remote Computing Microsoft Office Botnet Patch Management Gmail Company Culture Regulations Vendor Management IoT Automobile Storage Website Automation Machine Learning Data loss Identity Theft Point of Sale Alert How To Telephone Systems VPN Access Control HIPAA Wireless Health Data Security G Suite Mobile Device Management Server Management Mobile Security Samsung Business Technology Electronic Medical Records Firewall Physical Security Twitter Private Cloud Computer Care Virtual Private Network Smart Technology Computing Taxes Downtime Tech Support Robot Training Router Remote Monitoring and Management Websites Comparison Wires The Internet of Things Cameras Hard Disk Drive Bluetooth Language Internet Exlporer Service Level Agreement E-Commerce Notifications Firefox Superfish Sports Connectivity Gadgets Budget IT Solutions Staffing Spyware Address Multi-Factor Security Mirgation Printing Vulnerabilities Conferencing Avoiding Downtime Managed IT Service Modem WPA3 RMM Virtualization Monitors User Error Computer Repair Cybercrime Specifications Zero-Day Threat Law Enforcement CCTV Computing Infrastructure Value Utility Computing Features Administrator Search Webcam Disaster Heating/Cooling Permissions Users Upgrades Processors Google Calendar Remote Worker Geography Instant Messaging Time Management Break Fix Cookies Fleet Tracking Customer Service Operating System Education Printer Wearable Technology Managing Stress Help Desk Networking Black Friday Social Networking Backup and Disaster Recovery Gadget Alerts Electronic Health Records Finance Uninterrupted Power Supply Servers Fraud Star Wars Professional Services Monitoring WiFi Legislation Chatbots ROI High-Speed Internet Network Management Dark Web Nanotechnology Asset Tracking Spam Tech Terms Cortana Black Market Relocation Cleaning YouTube Financial Enterprise Content Management Bookmarks Travel Cyber Monday Motherboard MSP Human Error Emoji Managed IT Licensing Management Cyberattacks Crowdsourcing Supercomputer Development Authentication Cost Management USB Consulting GPS Analytics Mouse Identity Motion Sickness IT Support Touchscreen Microsoft Excel Screen Reader OneNote Theft Settings SharePoint Procurement Unified Communications Favorites Google Drive Proactive Permission Corporate Profile Outlook Cooperation Enterprise Resource Planning Files Personal Information IT Budget Cables Authorization Augmented Reality Update Web Server Solid State Drive Statistics Hotspot Assessment Dongle Managed Services Provider Office Tips Tracking Lenovo Tablet Legal Cabling Smart Tech Employee-Employer Relationship Error Digital Mail Merge Downloads IT Technicians Security Cameras Bring Your Own Device Project Management VoIP Techology Distributed Denial of Service IBM Test IT Consultant WannaCry Shortcut Unified Threat Management Staff Mobile Read Only Digital Payment Marketing Competition Printers Hard Drives IP Address CrashOverride Miscellaneous Regulation Mobile Office Domains Emergency Public Speaking Presentation Hiring/Firing Lithium-ion battery Fun Wireless Technology 5G Safety