Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Telesys Voice and Data directly at (800) 588-4430.


No comments yet
Already Registered? Login Here
Wednesday, 20 February 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Business Computing Malware Privacy Productivity Email Business Hosted Solutions Microsoft Internet Software Windows 10 Computer Network Security Managed Service Provider Backup IT Services Ransomware Mobile Devices Innovation Smartphone Android Managed IT services Hardware User Tips Google Social Media Outsourced IT Browser IT Support Workplace Tips Productivity Efficiency Communication Disaster Recovery Business Continuity Data Backup Upgrade Data Smartphones Data Recovery Cloud Computing Small Business Data Management App Business Management Holiday Microsoft Office Internet of Things Office Facebook Miscellaneous WiFi Server Office 365 Network Windows Remote Monitoring Phishing Tech Term Encryption Save Money Paperless Office Spam Artificial Intelligence Gmail Big Data Managed IT Services Apps Robot Hosted Solution Customer Relationship Management Recovery Passwords Employer-Employee Relationship Bandwidth Firewall Password Unified Threat Management Content Filtering VoIP Remote Computing How To Government Money communications Infrastructure Wi-Fi Office Tips Work/Life Balance Chrome Document Management Collaboration Tip of the week Risk Management Apple Avoiding Downtime Cybersecurity Vendor Management Word IT Support Customer Service Mobile Device Management Hacker Saving Money Presentation Mobile Device Business Growth Antivirus Project Management Virtual Reality Social Managed IT Data loss Compliance Downtime Outlook BDR Website SaaS BYOD Windows 10 Telephone Systems Applications Two-factor Authentication Settings Health Vulnerability Analytics File Sharing The Internet of Things Computers Hacking Mobile Computing Data Security Tech Support Alert Printing Data storage Education Operating System Computing IT Management Cybercrime IT solutions Safety Computer Care Tablet Wireless Technology Healthcare Specifications Wireless Training Business Technology Remote Monitoring and Management Automobile Regulations Upgrades User Budget YouTube End of Support Unified Communications Retail Mouse Patch Management LiFi Best Practice Lithium-ion battery Smart Technology Scam Legal Business Owner HIPAA Software as a Service Identity Theft Router Twitter Mobile Security Marketing Politics Monitors VPN Augmented Reality Travel Google Drive IBM Running Cable Websites Automation Virtual Private Network Competition Going Green Assessment Physical Security Server Management Licensing Taxes Search Information Technology Botnet Bring Your Own Device Sports Digital Payment IT service Samsung Humor Maintenance Cortana Virtualization Meetings Storage Administration Analyitcs Corporate Profile Bookmarks Relocation Identity flu season Redundancy Typing Troubleshooting Microsoft Excel IT Consulting Google Wallet Quick Tips Buisness Webcam Utility Computing Electronic Medical Records MSP Virtual Assistant Crowdsourcing Cooperation Dark Data Downloads History WannaCry Knowledge Phone System Favorites Private Cloud Fort Worth Cryptocurrency Blockchain Data Breach Drones Time Management Point of Sale Proactive Staff Multi-Factor Security Cabling Experience Staffing Conferencing Error flu shot Bitcoin Permissions Technology Laws Network Management Cost Management Flexibility Google Calendar VoIP GPS Employees Fort Worth IT Lenovo Windows 8 Fraud Unified Threat Management Touchscreen Google Maps Domains Web Server Management Update WPA3 Entrepreneur Operations Legislation Shortcut Disaster 5G Digital Tracking Application Administrator Social Networking 3D Printing DFW IT Service Superfish iPhone Net Neutrality business communications systems Users Public Speaking Cameras Enterprise Resource Planning Chromebook Fleet Tracking Law Enforcement Wearable Technology Network Congestion Uninterrupted Power Supply Spyware Motherboard Unsupported Software Emoji Internet Exlporer Internet Protocol CCTV Mobile Asset Tracking Gadget Display Solid State Drive Hacks How To Laptop Hard Drives Mobile Data Distributed Denial of Service Networking VoIP streamlines Heating/Cooling Virtual Desktop Company Culture PowerPoint Remote Workers IT Technicians Technology Tips Hard Disk Drive Current Events Firefox Halloween Supercomputer Refrigeration Modem Managed IT Service Zero-Day Threat Processors Hotspot business network infrastructure User Error Servers Consumers Help Desk G Suite Vulnerabilities Fun Information Mirgation Comparison Deep Learning Techology Scary Stories IT Budget Motion Sickness Cookies Break Fix Backup and Disaster Recovery Language data services Google Docs Printer Geography Electronic Health Records Migration Writing Black Friday Mail Merge eWaste Disaster Resistance Consultation Undo IT Sevices Nanotechnology Personal Information Dark Web Cables Procurement Computing Infrastructure Access Control Statistics Software Tips IP Address IT Consultant Cyberattacks Machine Learning Chatbots Social Engineering Cyber Monday Address Alt Codes Environment Data Warehousing Proactive IT IoT Computer Repair Wires Remote Worker Notifications Alerts SharePoint Bluetooth Mobile Office Cleaning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...