Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Telesys Voice and Data directly at (800) 588-4430.


No comments yet
Already Registered? Login Here
Sunday, 25 August 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet IT Services Network Security Windows 10 Computer Managed Service Provider Productivity Ransomware Backup Innovation Mobile Devices Smartphone Outsourced IT Data Backup Android User Tips Google Social Media Managed IT services Business Continuity Hardware Browser Communication IT Support Disaster Recovery Workplace Tips Data Recovery Upgrade Data Efficiency Cloud Computing Business Management Managed IT Services Data Management Smartphones Small Business App IT Support Internet of Things Holiday Phishing Microsoft Office Server Office Remote Monitoring Miscellaneous WiFi Facebook Network Office 365 Windows Gmail Big Data Spam Passwords Encryption Tech Term communications Password Save Money Paperless Office VoIP Artificial Intelligence Bandwidth Customer Relationship Management Firewall Collaboration Apps Hosted Solution Recovery Unified Threat Management Employer-Employee Relationship Risk Management Robot Hacker Chrome Content Filtering Vendor Management Managed IT Apple Avoiding Downtime Downtime Wi-Fi Infrastructure Office Tips Compliance Customer Service Mobile Device Management Windows 10 Document Management How To Tip of the week Operating System Analytics Government Money Cybersecurity Saving Money Remote Computing Work/Life Balance Word Outlook Education File Sharing IT Management Cybercrime Mobile Device Antivirus Project Management Automation Health Alert Social Business Technology Data loss Website Printing BDR Data storage Hacking Mobile Computing Computing Tech Support Telephone Systems Two-factor Authentication Settings Virtual Reality Training Vulnerability Applications SaaS The Internet of Things BYOD Computers Presentation Business Growth Data Security Help Desk Assessment Server Management Mouse Licensing Specifications Bring Your Own Device Search Digital Payment Sports Consultation Legal IT service Cortana Display Maintenance User Virtualization Administration Twitter Retail Politics Access Control Monitors Travel IT solutions Safety Google Drive Best Practice Websites Lithium-ion battery Wireless Technology Going Green Tablet Business Owner Physical Security Wireless Windows 7 Taxes Botnet Managed Service Marketing Samsung Healthcare Meetings YouTube Unified Communications Storage Competition Proactive Regulations LiFi Patch Management Information Technology Computer Care Remote Monitoring and Management Scam Humor Net Neutrality Laptops Identity Theft Analyitcs Smart Technology VPN Augmented Reality HIPAA Automobile Software as a Service Upgrades IBM Budget Running Cable Router Mobile Security Virtual Private Network End of Support Asset Tracking IT Budget IT Technicians Administrator Technology Tips Techology Scary Stories 3D Printing Chromebook Modem Procurement Cameras Managed IT Service data services Hotspot Law Enforcement User Error Mail Merge Network Congestion Vulnerabilities User Management Undo Remote Workers Mirgation Comparison Disaster Resistance Unsupported Software Emoji Statistics IP Address Software Tips Cookies Remote Worker CCTV Break Fix Language Alt Codes Gadget Printer Address Geography Hacks Information Migration Black Friday Proactive IT Mobile Data Bluetooth Mobile Office Nanotechnology Virtual Assistant Dark Web Computing Infrastructure Typing Redundancy Corporate Profile iPhone Cables Current Events Monitoring Chatbots Cyber Monday IT Consulting Buisness Quick Tips Processors History IoT Voice over Internet Protocol G Suite Data Warehousing Alerts Cryptocurrency SharePoint Knowledge WannaCry Wires Time Management Electronic Health Records Identity Motion Sickness flu season Data Breach Google Docs Cabling Utility Computing Microsoft Excel Staffing Cooperation Bitcoin Downloads Experience Writing Network Management Cyberattacks Fort Worth Technology Laws Personal Information Manufacturing PowerPoint IT Consultant Blockchain MSP GPS Staff Windows 8 Machine Learning Multi-Factor Security Lenovo Social Engineering VoIP Touchscreen Domains Bookmarks Google Maps Consumers Conferencing flu shot Unified Threat Management Computer Repair Permissions Notifications Shortcut 5G Disaster Entrepreneur Cost Management Proactive Maintenance Cleaning Tracking Flexibility Relocation Google Calendar Superfish Digital Application Public Speaking Google Wallet Favorites Employees Webcam Fort Worth IT business communications systems Users Electronic Medical Records Fraud Crowdsourcing Dark Data Uninterrupted Power Supply eWaste Management Processor Operations IT Sevices Private Cloud Legislation Spyware Drones Social Networking Zero-Day Threat Point of Sale DFW IT Service Internet Protocol Solid State Drive Environment Enterprise Resource Planning WPA3 Wearable Technology Error Networking Laptop How To Hard Drives Heating/Cooling Motherboard Backup and Disaster Recovery VoIP streamlines Virtual Desktop Internet Exlporer Hard Disk Drive Troubleshooting Mobile Active Directory Fleet Tracking Supercomputer Halloween Firefox Refrigeration Update Servers RMM Web Server Distributed Denial of Service business network infrastructure Phone System Deep Learning Fun Company Culture Windows Server

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...