Privileged User

21st February 2020 | Cybrary Privileged User


A Privileged User is a user of a computer who is authorized to bypass normal access control mechanisms, usually to be able to perform system management functions. Cybersecurity governance policies should clearly state limits on use of privileged accounts while also spelling out how you accomplish the separation of duties.

A privileged user is essentially a user that has acquired root access to a UNIX system, or administrator rights to a Windows system. These represent the highest level of permission given to a computer user. A user with administrative rights allows them to access anything within the system or network they are given administrative rights to. A user with these rights is given essentially “unrestricted access” to the entire system.

Related Terms: Administrator Rights, Least-Privilege, Need to Know, Separation of Duties

Related Readings: Enforcing PCI DSS Compliance Requirements & OS Isolation, Privileged Access: Yet Another Security Problem

What does this mean for an SMB?

SMBs can protect themselves from Ransomware threats and most other viruses and malware by following the principle of Least Privilege. If you remove admin rights from employees, they are prevented from installing software on their computers including both legitimate software, but also malware such as ransomware.

Removing these rights from employees is helpful from a cybersecurity perspective but may not always be possible if you have a sophisticated and technically savvy work-force.  In these cases, you can still provide those employees the privileged user credentials, but require that they not run their work life using such privileged accounts.  Instead, they should work in an unprivileged account most of the time.

To learn more about a Privileged User and how it relates to Least Privilege, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more
AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

Phishing emails used to be easy to spot. Bad grammar. Weird links. Obvious scams. Those days are...

Read more