sameer Shah
***** Superb and timely support from Brittany in resolving my MyGlue issue.
sameer Shah
2022-10-27
Richelle Kostiuk
Was having issues with internal emails and they were able to resolve the issue quickly and easily.
Richelle Kostiuk
2022-10-20
Ryan Thomson
Working with IT could easily be one of the most frustrating parts of a remote location job. Foresight For IT has been awesome, they are personable and have a very efficient email system that makes communication and updates a breeze.
Ryan Thomson
2022-10-20
Hether Duff Schwartz
The company I work for has started working with Foresight, and have been amazing in getting things done quickly and efficiently
Hether Duff Schwartz
2022-09-27
Elaine Rusnak
Great company to work with. Proactive. Problems solved in a timely manner. No question goes unanswered. I have learned a lot working with them.
Elaine Rusnak
2022-09-27
Ashleigh Plaine
Foresight it very helpful and quick to respond.
Ashleigh Plaine
2022-09-22
Cheri Wolgien
The team is very knowledgeable and prompt to provide support.
Cheri Wolgien
2022-09-19
Joseph Karpala
Foresight for it Corp - Kenneth was able to solve my access problem. Greatly appreciated. Joseph Karpala Advicoipc.ca
Joseph Karpala
2022-08-19
Lara Han
Always very professional, service is great and always exceptional every time i talked to support. They go above and beyond to ensure things are resolved.
Lara Han
2022-08-17
Shannon Costa
Getting IT support was so simple. A technician contacted me right away and was so fast and helpful. Best IT service I've had.
Shannon Costa
2022-08-17
April 22, 2021

Macro Vulnerabilities

Macros, a set of commands or code intended to automate specific functions are not dangerous in and of themselves.

Macro Vulnerabilities

Macros are most often used in Microsoft Word and Excel. Although intended to be time saving, macros do come with a security set back. Anyone can write a macro to automate any number of tasks, one of which could be with malicious intentions. One of the most recent macro scams, called Locky, disguises itself as an invoice with an attached word document. Once opened and macros enabled, the attach encrypts your files and provides a note on how to receive the key to access your files.

If Microsoft Macro Protection is enabled, a yellow bar appears at the top of the program with a shield icon and a button marked “Enable Content.” The malicious macro cannot run until you click the enable button, however with the file appearing to come from a trusted source often times the user will enable the macro thinking its required to view the information. Often times the text inside the document will also contain instructions on how to run macros and bypass the security so that the document can be viewed properly.

Microsoft Word and Excel both have macro security features but users still need to be extremely cautious with running macros. Always double check the source of the document and even consider letting IT look at it before you enable macros from a source you do not know.

Related posts:
6 Steps Businesses Can Take to Get Their Cybersecurity in Order
Read more chevron_right
Who Handles Cybercrime in Canada?
Read more chevron_right
Cyber Espionage Explained
Read more chevron_right See all blogs chevron_right