Extremely valid point, I'd consider this close to table stakes.
Also, in some more "interesting" settings there's also exploit-loaded documents to be aware of, here's from a leak I've been following lately:
> If you really want to open a Word document from Psy-Group, please go ahead, knock yourself out. Below are the links to the Word document as well as the email. Just remember that Mr. [...] mistake might have been opening a Word file from Psy-Group in the first place…
I took the liberty to remove the name as I guess that particular guy is probably suffering enough at the moment.
Also, in some more "interesting" settings there's also exploit-loaded documents to be aware of, here's from a leak I've been following lately:
> If you really want to open a Word document from Psy-Group, please go ahead, knock yourself out. Below are the links to the Word document as well as the email. Just remember that Mr. [...] mistake might have been opening a Word file from Psy-Group in the first place…
I took the liberty to remove the name as I guess that particular guy is probably suffering enough at the moment.