{"id":27214,"date":"2021-10-05T16:45:00","date_gmt":"2021-10-05T14:45:00","guid":{"rendered":"https:\/\/perseus.de\/how-to-better-protect-yourself-from-malware-from-office-documents\/"},"modified":"2026-03-30T15:33:23","modified_gmt":"2026-03-30T13:33:23","slug":"how-to-better-protect-yourself-from-malware-from-office-documents","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/","title":{"rendered":"How to better protect yourself from malware from Office documents"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27214\" class=\"elementor elementor-27214 elementor-3428\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"543\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png\" class=\"attachment-medium_large size-medium_large wp-image-27213\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1-300x212.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53e7aded e-flex e-con-boxed e-con e-parent\" data-id=\"53e7aded\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-70abc6c9 e-con-full e-flex e-con e-child\" data-id=\"70abc6c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9000f68 e-con-full e-flex e-con e-child\" data-id=\"9000f68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e314e5c e-con-full e-flex e-con e-child\" data-id=\"e314e5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6271c22 elementor-widget elementor-widget-text-editor\" data-id=\"6271c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>05.10.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6921e9d elementor-widget elementor-widget-heading\" data-id=\"6921e9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to better protect yourself from malware from Office documents\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9383e53 elementor-widget elementor-widget-text-editor\" data-id=\"9383e53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Everyday Clues | Cybersecurity | Microsoft Office<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f88ede e-con-full e-flex e-con e-child\" data-id=\"0f88ede\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d847b0 elementor-widget elementor-widget-text-editor\" data-id=\"1d847b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word &amp; Co. But cybercriminals also like to use Office programs \u2013 to spread malware. We&#8217;ll tell you how you can better protect yourself against it.   <\/strong><\/p><p><strong> <\/strong><\/p><h4><strong>How cybercriminals can misuse Office documents<\/strong><\/h4><p>Office documents are popular gateways for cybercriminals. Not only because of the widespread use of Microsoft programs, but also because active content can be integrated into Office documents. This active content is ultimately small programs. And cybercriminals can use them for their own purposes. For example, such a program can ensure that malware is downloaded from the Internet. Some companies and institutions are taking drastic protective measures against such attack opportunities. For example, they automatically delete all emails with attached, open Office documents. Or all emails whose attached Office documents contain active content. PDF documents, on the other hand, are usually accepted as attachments.        <\/p><p>The protective measures recommended below do not go that far. Therefore, you are always in demand. Your eye, your attention, or even just your gut feeling that something is wrong with a document or an email attachment can prevent major damage. So stay mindful.   <\/p><p>Important: In companies, clear guidelines for handling Office documents are indispensable. This is especially true for documents from external sources, such as applications and invoices. The experts at Perseus will be happy to advise you.  <\/p><p><strong> <\/strong><\/p><h4><strong>Measure 1: Distrust all Office documents that have not been specifically announced  <\/strong><\/h4><p>What is the ideal case if you receive malware in the form of an Office document? They recognize the document as suspicious and do not open it. You have already nipped the possible attack in the bud \u2013 bravo!  <br>Therefore, treat all Office documents you receive critically. In particular, surprising invoices, reminders or order confirmations that are received by e-mail. <\/p><p><strong> <\/strong><\/p><h4><strong>Measure 2: Do not open documents with administrator rights  <\/strong><\/h4><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What are administrator rights?<\/strong><\/em><\/p><p>Computers need to be managed, set up, and updated. This requires deep interventions in the system. Whoever takes on this task is considered an administrator \u2013 and needs unlimited access rights to all systems of the computer. These unlimited access rights are therefore also called administrator rights.   <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What is problematic about administrator rights?<\/strong><\/em><\/p><p>Because administrator privileges allow unlimited access to a computer, their abuse can cause enormous damage. It is sufficient if a malware program is executed with administrator rights. Because then it can make all the changes you want to your computer.  <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What to do?  <\/strong><\/em><\/p><ul><li>As a matter of principle, do not work with administrator rights, but in a user account with deliberately limited access rights.<\/li><li>Make sure that the accounts have different passwords to avoid confusion. Here&#8217;s how to create a user account on PC on <a href=\"https:\/\/support.microsoft.com\/de-de\/windows\/erstellen-sie-ein-lokales-benutzer-oder-administratorkonto-in-windows-20de74e0-ac7f-3502-a866-32915af2a34d#WindowsVersion=Windows_10\">Windows <\/a>and <a href=\"https:\/\/support.apple.com\/de-de\/guide\/mac-help\/mtusr001\/mac\">Mac<\/a>. <\/li><li>Do not open Office documents (or other files) with administrator privileges.<br>If you receive a message when opening an Office document that administrator rights are required, cancel the process immediately. Do not open the document under any circumstances. <\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>Measure 3: Disable macros<\/strong><\/h4><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What are macros?<\/strong><\/em><\/p><p>The term macro comes from software programming. There, macros are small subroutines that are often used like building blocks. They usually contain the program code of multi-step processes \u2013 which then no longer have to be programmed manually step by step.<br>Because the principle is so practical, Microsoft has made it usable in the Office programs even for users without programming knowledge. Here, multi-step processes can be easily recorded, saved as a macro and then repeated as often as desired. For example, if the respective date is to be displayed in several places in a document. The corresponding macro automatically updates it when you open or save the document.     <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Why are macros problematic?  <\/strong><\/em><\/p><p>Macros are small programs that are included in an Office document and run automatically. In everyday office life, this is helpful if the macro fulfills a desired function \u2013 such as the above-mentioned update of the date. <\/p><p>It becomes problematic when a macro has been programmed by cybercriminals. Because then your program will be executed automatically. What it does depends on the cybercriminals&#8217; goals. Maybe it just opens countless new documents. Or it downloads malware from the Internet that encrypts your computer. Practically everything that can be programmed is possible.     <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What to do?  <\/strong><\/em><\/p><p>Usually, you don&#8217;t have to do anything, because macros are disabled by default in the Office programs. This applies to both PCs and Macs. We advise: Play it safe and check that macros are deactivated for you.<br>Here you can find Microsoft&#8217;s instructions on how to disable and activate macros for <a href=\"https:\/\/support.microsoft.com\/de-de\/office\/makros-in-office-dateien-12b036fd-d140-4e74-b45e-16fed1a7e5c6?ui=de-de&amp;rs=de-de&amp;ad=de\">PC <\/a>and <a href=\"https:\/\/support.microsoft.com\/de-de\/office\/aktivieren-oder-deaktivieren-von-makros-in-office-f%C3%BCr-mac-c2494c99-a637-4ce6-9b82-e02cbb85cb96\">for Mac<\/a>.  <\/p><p><strong> <\/strong><\/p><h4><strong>Measure 4: Do not activate macros manually either  <\/strong><\/h4><p>As I said, macros are disabled by default in current Office programs. But often they can be activated manually. We advise: Don&#8217;t do that! And if you are asked to do so? Then be sure to consult.<br>Cybercriminals can be very sophisticated in their efforts to get you to activate macros. For example, the Emotet Trojan, which has been feared for years, sent extremely authentic-looking emails, most of which contained an Office attachment. The body of the email explicitly asked to activate the macros in the attached document. Only then could the malicious code hidden in the documents become active. Even though the Emotet infrastructure was dismantled at the beginning of 2021, this attack tactic can still be used. Therefore, we advise the utmost caution.         <\/p><p><strong> <\/strong><\/p><h4><strong>Measure 5: Do not activate OLE manually either  <\/strong><\/h4><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What is OLE?  <\/strong><\/em><\/p><p>At Microsoft, OLE stands for Object Linking and Embedding, i.e. for linking or embedding objects. Such objects can include graphics, videos, and tables. For example, if a Word document links to a table, it can be edited in Excel. On the other hand, if this table is embedded in Word, it can be edited directly in Word. In order for the embedded objects to be usable, a corresponding program code must be integrated into the document. For cybercriminals, this means a way to embed malicious code.     <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What is the danger?<\/strong><\/em><\/p><p>OLE objects manipulated by cybercriminals usually have to be clicked on in order to become active. Various tricks are used for this purpose. For example, the object can look like a field in which they are supposed to enter a security code. Or the accompanying email will ask you to take appropriate actions.   <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What to do?<\/strong><\/em><\/p><p>Do not enable embedded objects. If you are asked to do so, be sure to consult us. <\/p><p><strong> <\/strong><\/p><h4><strong>Action 6: Open documents in sandboxes  <\/strong><\/h4><p><em><strong> <\/strong><\/em><\/p><p><em><strong>What is a sandbox?  <\/strong><\/em><\/p><p>The English term &#8220;sandbox&#8221; translates as sandbox. In IT, sandbox refers to a separate, isolated area within a system. Actions or programs that run in this sandbox are limited to this sandbox and do not affect the overall system. If the sandbox is closed, all of its content will be deleted.   <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Where can I find such a sandbox?<\/strong><\/em><\/p><p>Sandboxes are already available in some operating systems. On Macs, most programs even run in their own sandbox, even newer Office programs.<br>Sandboxes are also included in Windows 10 Enterprise, Windows 10 Professional, or Windows 10 Education versions 1809 or later. Unfortunately, they are disabled by default. You can find out how to activate it at <a href=\"https:\/\/docs.microsoft.com\/de-de\/windows\/security\/threat-protection\/windows-sandbox\/windows-sandbox-overview\">Microsoft<\/a>, for example.<br>If your operating system does not have a sandbox built-in, you can install a separate program for this. Many virus scanners also have a sandbox.    <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Since no protection is 100%<\/strong><\/em><\/p><p>No technology is infallible, and this also applies to sandboxes. We therefore recommend that you use them prudently and always take all the measures mentioned above in addition. <\/p><p><strong> <\/strong><\/p><h4><strong>Measure 7: If in doubt, ask professionals  <\/strong><\/h4><p>Are you a Perseus member, distrust an Office document and don&#8217;t want to take any risks? Then simply forward the document to us and we will check it for you. <\/p><p>Not a Perseus member yet? Then contact your company&#8217;s IT department&#8230; and also suggest that a procedure be defined for dealing with Office documents. Especially for all people who come into contact with potentially critical documents such as supposed applications or invoices.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word &amp; Co. But cybercriminals also like to use Office programs \u2013 to spread malware. We&#8217;ll tell you how you can better protect yourself against it.   <\/p>\n","protected":false},"author":3,"featured_media":27213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to better protect yourself from malware from Office documents - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to better protect yourself from malware from Office documents - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word &amp; Co. But cybercriminals also like to use Office programs \u2013 to spread malware. We&#039;ll tell you how you can better protect yourself against it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-05T14:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:33:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"How to better protect yourself from malware from Office documents\",\"datePublished\":\"2021-10-05T14:45:00+00:00\",\"dateModified\":\"2026-03-30T13:33:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/\"},\"wordCount\":1359,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Office-Dokumente-via-Pixabay-768x543-1.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/\",\"name\":\"How to better protect yourself from malware from Office documents - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Office-Dokumente-via-Pixabay-768x543-1.png\",\"datePublished\":\"2021-10-05T14:45:00+00:00\",\"dateModified\":\"2026-03-30T13:33:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Office-Dokumente-via-Pixabay-768x543-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Office-Dokumente-via-Pixabay-768x543-1.png\",\"width\":768,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-to-better-protect-yourself-from-malware-from-office-documents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to better protect yourself from malware from Office documents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to better protect yourself from malware from Office documents - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/","og_locale":"en_US","og_type":"article","og_title":"How to better protect yourself from malware from Office documents - Perseus Technologies","og_description":"85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word &amp; Co. But cybercriminals also like to use Office programs \u2013 to spread malware. We'll tell you how you can better protect yourself against it.","og_url":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/","og_site_name":"Perseus Technologies","article_published_time":"2021-10-05T14:45:00+00:00","article_modified_time":"2026-03-30T13:33:23+00:00","og_image":[{"width":768,"height":543,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"How to better protect yourself from malware from Office documents","datePublished":"2021-10-05T14:45:00+00:00","dateModified":"2026-03-30T13:33:23+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/"},"wordCount":1359,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/","url":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/","name":"How to better protect yourself from malware from Office documents - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png","datePublished":"2021-10-05T14:45:00+00:00","dateModified":"2026-03-30T13:33:23+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Office-Dokumente-via-Pixabay-768x543-1.png","width":768,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/how-to-better-protect-yourself-from-malware-from-office-documents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"How to better protect yourself from malware from Office documents"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27214"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27214\/revisions"}],"predecessor-version":[{"id":27215,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27214\/revisions\/27215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27213"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}