logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
1st June 2018 by CyberVision 0 Comments 935 Views
1st June 2018 by CyberVision in Business Security

Macros can be dangerous for your network

macros

 

Microsoft Office documents containing macros can be hazardous to the overall security of your network. Macros are bits of computer code used to automatically perform repeated tasks and historically have been notorious vehicles for malware. With more recent events such as the outbreak of ransomware and cryptojacking, the latest versions of Office include security features that will protect you from malfeasant macros.

 

Microsoft Office documents — Word, Excel, PowerPoint, as well as others — can contain embedded code written in a programming language known as Visual Basic for Applications (VBA). The recent rise in cybercrime has given the general public several examples of how malicious hackers could manipulate VBA code to create macros that intentionally do damage. The act of embedding these macros in Office documents and distributing them online raises even more concern for the average internet user. Malicious consequences of malware may include deleting of files or hidden viruses that infect your entire network. Data breaches or the loss of important information may very well be the worst case scenario for many businesses.

Sharing document scripts and macros over email is also a habit you should try and break if this is something you are used to doing. You would have to download a file containing a malicious macro in order to actually be infected by it and in the rare situation of needing to accept these files via email, only run macros from people or organisations that you know and trust. Another good tip is to maintain the built-in macro security features and make sure that they are not disabled.

 

Like any other computer program, macros should only be run from sources you know and trust. Tightening up your email etiquette in the workplace may be a tedious task for some, but may prevent any losses in the future.

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • email security
  • f-secure
  • f-secure cyber security
  • macros
  • online security
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo