Data Breach

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings

Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation’s network. Compromised macros can often evade basic email content filtering and application whitelisting.

While macros can greatly improve productivity, they can also make your systems vulnerable, especially if they are out-of-date or downloaded from the Internet.

All macros created by users or third parties should be reviewed before being approved for use within the organisation. By understanding the business requirements for the use of macros, and applying the necessary mitigation strategies, organisations can effectively manage the risk of allowing them in their IT environment.

Note: The best approach is to block macros from the Internet and only allow vetted macros either in “trusted locations” with limited write access or digitally signed with a trusted certificate. 

In the SECMON1 blog post ‘Security Overview – Information Security Essentials’, we spoke about what Microsoft Office Macros are and why it is an essential security measure to configure or even disable them. 

In this document, we are going to provide some basic macro configuration steps to assist in strengthening your security, as well as providing you with some interesting and important links where you can educate yourself further on this topic and identify other options available to you.

CLICK HERE TO DOWNLOAD THIS SECMON1 INFORMATION SECURITY ESSENTIALS GUIDE

Christopher McNaughton

Recent Posts

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear…

12 months ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might…

4 years ago

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68%…

4 years ago

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee,…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to…

4 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was…

5 years ago