Tech Tip: How to use footnotes and endnotes in Word • Blisstech Solutions

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you.

Usually, when you write such a document, you may need to expand on certain sentences without making the sentence too wordy, or create a reference for further reading. This is where footnotes and endnotes come in.

It is a great tip and is something I’ve used a lot in the past. Once I learned how to do this properly, it saved me a lot of time. Just like cross-references, footnote and endnotes can automatically update don’t have to do it manually and you can also use them in cross-references (see my previous video on that).

This tip will show you:
👉 How to create footnotes and endnotes in your documents.
👉 The differences between footnotes and endnotes.

Today’s tip will help you to:
đź’Ą Organise your document structure so it can be easily navigated.
đź’Ą Create professional documents with references within.
đź’Ą Stop manually updating information in your documents by using Word the way it was intended.

We hope you enjoy it.

More Content

Young employees have different attitudes to cyber crime

If you employ anyone aged between 16 and 19, you need to pay special attention to the cyber security training you’re giving your team.

If it ain’t broke… Windows update makes signing out simple again

Windows update makes is easy to sign out of Windows 11 again

Having trouble finding the sign out button in Windows 11? You’re not the only one! Luckily, Microsoft have listened… find out more here.

Everything you need to know about password managers for your business

If you’re confused about password managers, you’re not alone. A password manager is software that generates safe passwords, remembers them, and auto-fills logins for you. That saves time. But means your business can quickly lock out staff when they leave. Some people...
Professional woman at a laptop

6 ways to make your small business look professional

When you start out in business, one of the hardest things to do is find new clients.  Most customers will not buy from you unless they trust you, and trust usually comes from reputation.  But how do you gain people's trust if you are new and don't have much of a...

Tech Tip: How to use Search Outlook Folders to organise your Inbox

Welcome to a new Tuesday Two Minute Tech Tip that will help you to organise your inbox using the Outlook powerful search features. Are you the kind of person who likes to organise emails into folders? Are you manually dragging your emails around to organise them? This...

Learn how to talk tech with our Jargon Buster

Do you find IT terminology difficult to comprehend? To ensure effective communication with our clients, we strive to avoid using technical jargon. However, having a basic understanding of some IT terminologies may prove advantageous in seeking IT assistance in the...
Windows 11 uptake is at an all-time high – what are you waiting for?

Windows 11 uptake is at an all-time high – what are you waiting for?

If you’re still attached to Windows 10, now’s the right time to upgrade. Here’s why…

Is this the most dangerous phishing scam yet?

Is SubdoMailing the most dangerous phishing scam yet?

Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.

Laptop and stethoscope

How Much Should You Pay for IT Managed Service Costs in the UK?

If you are looking for managed IT services in the UK, you should understand there is no "one-size-fits-all" solution. There are many managed service providers out there and they offer a huge range of prices. This can be overwhelming when trying to choose between them!...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.
Why?
Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.
Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.
A compromised password can lead to big issues, such as:
• Data breaches
• Financial losses
• Identity theft
• Reputation damage
But how do you create strong passwords without driving yourself (and your team) mad?
Think of your password like a secret recipe, where only you should know the ingredients. It should:
• Be at least 14 characters long (the longer, the better)
• Include a mix of uppercase and lowercase letters
• Contain a few numbers and symbols (like @, $, %, or &)
• Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)
Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.
You should also steer clear of these common mistakes:
• Using personal info (your name, birthday, business name, etc.)
• Reusing the same passwords across multiple accounts
• Using simple sequences (“123456” or “abcdef”)
• Storing passwords in an easily accessible place (like a sticky note on your desk)
If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.
With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.
Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.
If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:
• Unique passwords for each system and account
• Regular security training on password best practices
• Business-wide use of MFA for critical systems
• Scanning for compromised passwords regularly
By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.
And if you need help making your business more secure, get in touch.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05