After some block and forth, Microsoft stops Office macros by default

The block is back.

Microsoft has disabled by default the oft-helpful, oft-malwared shortcuts known as macros. And it got confusing for a second. In February, Microsoft announced a block, then a rollback, then a clarification that the rollback was temporary, and now, finally, a rollout.

“To help improve security in Office, we’re changing the default behavior of Office applications to block macros in files from the internet,” according to a July 20 post from Microsoft.

Yay, macros! A macro is a small program or script, written in Visual Basic for Applications (VBA) and built to automate tasks in Office that would normally be done manually. With a macro, users can one-click their way through a number of efforts, like removing text wrap from an entire Excel spreadsheet, unmerging all merged cells, or saving a workbook with a time stamp in the name.

Nay, macros! Though macros can save time, they can also provide shortcuts for malware installation.

A Q1 2022 threat report from the managed detection and response provider Expel found that “threat actors used macro-enabled Word documents and zipped JavaScript files as the initial attack vector in 82% of all pre-ransomware incidents.” A February 2022 post from the software company Netskope revealed that 31% of all malware downloads blocked by the company were malicious Office files.

Now, according to the July 20 Microsoft post, macros from the internet will be blocked by default in Office, and when a reader opens a macro file, a security-risk warning will be displayed. While users are able to override the feature and enable macros if needed, the preselected setting is a step in the right direction, according to Roman Shain, information technology specialist at Nero Consulting.

“Microsoft is kind of helping everyone out in a way by saying, ‘Hey, look twice before crossing the street.’” Shain told IT Brew.

Hot this week

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

Topics

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.
spot_img

Related Articles

Popular Categories