Skip to content

Cybersecurity Awareness Issue 102- Do Not Enable Content

This article will discuss a tactic that has been utilized in different ways by hackers for over 10 years. Microsoft Office products have functionality built in to run programs called macros, which are programs that can be embedded in Word, Excel, and PowerPoint. Let’s say you want Excel to carry out some background calculations to modify specific cells based on the data set specified, a macro could be created and clicked upon to allow this to occur in a split second. This is a legitimate use of macro code.

Related Articles

Let's Chat About IT

Together, we’ll discover the tailored services that address your business’s needs.

Back To Top