(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to SouthBridge Consulting directly at (281) 816-6430.

Prioritize the Protection of Your Google Account
The Top 5 Smartphones For You Heading Into 2019
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Tech Term Privacy Email Data Business Internet Hosted Solutions Business Computing Data Backup Malware IT Support Cloud Cloud Computing Hackers IT Services Business Management Mobile Devices Encryption Computer Small Business Software Network Security Efficiency Google Hardware Android Server Outsourced IT Paperless Office Windows 10 Workplace Tips Artificial Intelligence Managed IT Services Upgrade VoIP Holiday Passwords Data Recovery Browser Managed Service Innovation Government User Tips Saving Money Quick Tips Smartphones BYOD Healthcare Infrastructure Two-factor Authentication Document Management Wi-Fi Applications Vulnerability Communication Blockchain Information Collaboration Ransomware Bandwidth Employer-Employee Relationship Website Office 365 Scam Remote Monitoring Smartphone Backup HIPAA Social Media VPN Chrome Automation Antivirus Mobile Security Bring Your Own Device Phishing Communications Management Access Control Network Microsoft Compliance Business Technology Business Continuity Managed IT services Machine Learning IT Management Cybersecurity Internet of Things Managed Service Provider Maintenance Router Microsoft Office Data Management Tablet Gmail Storage Staff Disaster Recovery Enterprise Content Management Professional Services Multi-Factor Security IT Technicians How To Permission Customer Service Printer Money Smart Tech Authorization Computing Computing Infrastructure Identity eWaste Features Security Cameras Break Fix Virtual Reality Cookies Development Mobile Device Voice over Internet Protocol Legislation Fraud Hard Drive Consulting Downtime Spam Smart Technology Social Networking Unified Communications Help Desk Vendor Management Wireless Server Management Assessment Employee-Employer Relationship Test Private Cloud Mobile Device Management Microsoft Excel Connectivity Employees Comparison Alerts Patch Management Nanotechnology Cables Instant Messaging Net Neutrality Remote Computing Cache Managed Services Provider Tech Terms Firewall Motherboard Office Risk Management Mirgation Internet Exlporer Remote Workers Electronic Health Records ROI IoT Remote Monitoring and Management Specifications Wires Finance Windows 7 Augmented Reality Hotspot Point of Sale Theft Tech Support BDR G Suite Bookmarks Wasting Time RMM Regulations Company Culture Files Notes Apps SharePoint Data Security Star Wars Zero-Day Threat Black Friday Licensing Dark Web App Facebook The Internet of Things Mouse Language Chatbots Network Management E-Commerce Financial Distributed Denial of Service Chromebook Favorites Windows Google Calendar Permissions Monitoring Electronic Medical Records Cooperation Data loss Managing Stress Read Only PowerPoint Downloads Cost Management OneNote Human Error Customer Relationship Management Cyber Monday Wearable Technology Screen Reader Authentication Identity Theft Recycling Save Money Social Users Managed IT Service Modem Vulnerabilities Politics Database Operating System Printers Miscellaneous Mobile Office Virtualization Domains Hard Drives Regulation Windows 10 Search Public Speaking Presentation Lithium-ion battery Cortana Wireless Technology 5G Safety IBM Marketing Hacker Criminal Justice Productivity Gadgets Budget Hiring/Firing Alert Competition IP Address Big Data Fun Twitter