This document has been developed to discuss approaches that can be applied by organisations to secure systems against malicious macros while balancing both their business and security requirements. However, macros can contain malicious code resulting in unauthorised access to sensitive information as part of a targeted cyber intrusion. Microsoft Office applications can execute macros to automate routine tasks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |