Least Privilege

6th January 2020 | Cybrary Least Privilege


Least Privilege refers to the access that is given to a user on a device or computer. Giving a user least privilege is to give a user account only the essential functions on the device needed to do their job. Giving a user least privilege helps protect individuals and companies from accidental disclosure of sensitive information, and sometimes the compromise of the computing environment users are operating within.

Why Should “Least Privilege” Matter to an SMB?

One of the best ways to protect your SMB from a major security breach is to implement the principle of Least Privilege by removing Administrator Rights from each employee operating a desktop computer.  This single action can mean the difference between a major ransomware compromise incident and no incident at all.

Why? When your employee is tricked by a hacker into downloading and running malware on their computer, not having Administrative Rights should prevent the malware from installing.  This lack of local computer system rights could prevent the malware from encrypting that users files as well as the files they can access to on network file servers!

Related Terms: Availability, Confidentiality, Integrity, Need to Know, Ransomware

Source: DABCC Inc.

To learn more about this topic, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more