Securing Microsoft Office apps
Microsoft Office applications are an important aspect of any business, and many enterprises receive daily phishing attempts or malicious content as attachments in an email.
As mentioned earlier, when I discussed some of the different ransomware attacks, many of them started as an email with a document, and when the user ran the code in the document, the attacker gained a foothold. One example is a ransomware variant, dubbed Locky, that used phishing emails containing word documents with malicious content. These documents were embedded with macros, so once the user clicked on the enabled content, the malware executable would then download an additional payload from a web server and begin looking for attached drives and network shares to encrypt.
So, having some additional security mechanisms in place for our Office applications is also an important aspect of reducing the risk of ransomware attacks.
When it comes to managing Microsoft Office applications...