After some block and forth, Microsoft stops Office macros by default

The block is back.

Microsoft has disabled by default the oft-helpful, oft-malwared shortcuts known as macros. And it got confusing for a second. In February, Microsoft announced a block, then a rollback, then a clarification that the rollback was temporary, and now, finally, a rollout.

“To help improve security in Office, we’re changing the default behavior of Office applications to block macros in files from the internet,” according to a July 20 post from Microsoft.

Yay, macros! A macro is a small program or script, written in Visual Basic for Applications (VBA) and built to automate tasks in Office that would normally be done manually. With a macro, users can one-click their way through a number of efforts, like removing text wrap from an entire Excel spreadsheet, unmerging all merged cells, or saving a workbook with a time stamp in the name.

Nay, macros! Though macros can save time, they can also provide shortcuts for malware installation.

A Q1 2022 threat report from the managed detection and response provider Expel found that “threat actors used macro-enabled Word documents and zipped JavaScript files as the initial attack vector in 82% of all pre-ransomware incidents.” A February 2022 post from the software company Netskope revealed that 31% of all malware downloads blocked by the company were malicious Office files.

Now, according to the July 20 Microsoft post, macros from the internet will be blocked by default in Office, and when a reader opens a macro file, a security-risk warning will be displayed. While users are able to override the feature and enable macros if needed, the preselected setting is a step in the right direction, according to Roman Shain, information technology specialist at Nero Consulting.

“Microsoft is kind of helping everyone out in a way by saying, ‘Hey, look twice before crossing the street.’” Shain told IT Brew.

Hot this week

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

Topics

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

When More Security Tools Create More Risk

Adding security tools often increases risk through complexity. Learn how consolidation and staff training create stronger defenses than endless tool accumulation.

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.
spot_img

Related Articles

Popular Categories