Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

When Documents Aren’t All Created Equally
However, if one sheet has a picture of a cat on it, and the other one has the coordinates to the lost city of El Dorado, one page suddenly has considerably more value than the other. This happens all the time with documents in a business setting, and depending on the business, many of these documents can be basic text files. With the popularity of the Microsoft Office software titles, there’s also a fair chance that the go-to word processing software in your office is Microsoft Word.

Microsoft Word offers many business-friendly features that many of its users don’t know about - including the capability to protect a document with a password. This allows a document’s creator to restrict access to only those other users who need to have this kind of access for review or collaboration purposes. Doing so is relatively simple:

Adding a Password

  • In the File tab, select Info
  • Select the Protect Document button and find Encrypt with Password in the drop-down options. You will be presented with the Encrypt dialog box.
  • In the provided space, enter the password you want to use. These passwords are case-sensitive and cannot be recovered if forgotten. Keep this in mind before resorting to this option. Once you’ve settled on a password, click OK, confirm your password by typing it again, and click OK again.

Just like that, your Word document will require that password before it can be viewed. This process works whether you’re using Microsoft Word 2016 or Microsoft Office 365.

If you ever need to remove the password from this file, you will actually follow the same steps until you reach the Encrypt dialog box. You should see the password you chose in the provided space. Delete it and press OK.

Your document should now again be available for hypothetically anyone to access, assuming that they have the ability and authorization to do so. For more tips, subscribe to this blog, and for more solutions to assist your security and operations, reach out to Telesys Voice and Data directly at (800) 588-4430.


No comments yet
Already Registered? Login Here
Wednesday, 24 April 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Productivity Email Business Hosted Solutions Microsoft Internet Software Windows 10 IT Services Network Security Computer Managed Service Provider Backup Ransomware Innovation Mobile Devices Smartphone Android Hardware User Tips Google Managed IT services Outsourced IT Data Backup Social Media Productivity Browser IT Support Disaster Recovery Workplace Tips Business Continuity Efficiency Communication Data Recovery Upgrade Data Business Management Cloud Computing Data Management Smartphones Small Business App Internet of Things Managed IT Services Holiday Microsoft Office Office Remote Monitoring Facebook Phishing Miscellaneous WiFi Network Server Office 365 Windows Tech Term IT Support Spam Encryption Passwords Save Money Paperless Office Artificial Intelligence Gmail Big Data VoIP Unified Threat Management Apps Customer Relationship Management Hosted Solution Recovery communications Robot Employer-Employee Relationship Risk Management Password Bandwidth Firewall Tip of the week Remote Computing Cybersecurity Content Filtering Compliance Chrome How To Wi-Fi Government Office Tips Money Apple Avoiding Downtime Work/Life Balance Analytics Collaboration Customer Service Infrastructure Mobile Device Management Word Vendor Management Hacker Document Management Saving Money Education Business Growth Vulnerability Presentation Alert Cybercrime Printing Data storage Data Security Computing Outlook Social Downtime Website Virtual Reality IT Management SaaS BYOD Health Mobile Device Two-factor Authentication Antivirus Applications Settings Project Management Hacking Managed IT Mobile Computing Data loss Business Technology Tech Support BDR The Internet of Things Computers File Sharing Operating System Windows 10 Telephone Systems Automation IT service Physical Security Going Green Cortana Taxes Botnet Identity Theft Virtualization Administration Samsung VPN Specifications Meetings IT solutions Safety Storage Virtual Private Network Assessment Wireless Technology Healthcare User Server Management Licensing Wireless Computer Care Digital Payment Proactive Retail Regulations Training Maintenance Best Practice YouTube Remote Monitoring and Management Lithium-ion battery Unified Communications Business Owner Net Neutrality Automobile Upgrades Budget LiFi End of Support Marketing Smart Technology Tablet Mouse HIPAA Software as a Service Router Competition Mobile Security Augmented Reality Legal Running Cable Information Technology IBM Twitter Humor Politics Monitors Travel Search Google Drive Patch Management Bring Your Own Device Analyitcs Websites Sports Scam Employees Internet Protocol Cables Troubleshooting Computing Infrastructure Motion Sickness Access Control IP Address Google Docs Electronic Health Records Chatbots Solid State Drive Cyber Monday Alt Codes How To Data Warehousing Writing Networking IoT Zero-Day Threat VoIP streamlines Wires Heating/Cooling Alerts Phone System SharePoint Personal Information Mobile Office Cyberattacks Identity IT Consultant Hard Disk Drive flu season Typing Firefox Microsoft Excel Machine Learning Supercomputer Buisness Social Engineering Utility Computing Backup and Disaster Recovery business network infrastructure Managed Service Servers Cooperation Help Desk Downloads Computer Repair Notifications Knowledge Bookmarks Cleaning Fort Worth Cryptocurrency Blockchain Relocation IT Budget Techology Google Wallet Procurement data services MSP Staff Webcam Multi-Factor Security Electronic Medical Records Crowdsourcing Experience Dark Data Favorites Mail Merge flu shot Bitcoin Consultation Permissions Private Cloud Disaster Resistance Cost Management Drones Remote Worker iPhone Statistics Flexibility Point of Sale Software Tips Google Calendar Windows 8 Conferencing Address Fort Worth IT Fraud Error Domains Proactive IT Management 5G Virtual Assistant Entrepreneur Bluetooth Operations Legislation Application Redundancy Social Networking Corporate Profile DFW IT Service Quick Tips Users Public Speaking IT Consulting Enterprise Resource Planning Voice over Internet Protocol WPA3 Wearable Technology Web Server History Update Motherboard WannaCry Data Breach Mobile Time Management Internet Exlporer Administrator PowerPoint 3D Printing Fleet Tracking Cameras Cabling Chromebook Distributed Denial of Service Law Enforcement Staffing Laptop Network Congestion Hard Drives Consumers Technology Laws Company Culture Network Management Virtual Desktop Unsupported Software Asset Tracking IT Technicians CCTV Technology Tips Emoji VoIP Managed IT Service Gadget GPS Halloween Display Refrigeration Lenovo Modem Unified Threat Management Vulnerabilities eWaste Touchscreen Hotspot Google Maps User Error Mobile Data Hacks IT Sevices Fun Remote Workers Shortcut Mirgation Disaster Comparison Deep Learning Digital Break Fix Tracking Scary Stories Superfish Cookies business communications systems Geography Environment Language Printer Current Events Information Migration G Suite Uninterrupted Power Supply Black Friday Processors Spyware Dark Web Undo Nanotechnology

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...