nist zero trust image

Zero Trust

Zero Trust is a security strategy focused on the belief that organizations shouldn’t automatically trust anything insideĀ orĀ outside its perimeters and instead must verify anything and everything trying to connect to …

rbac cyber term

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of individual users within a business. RBAC lets employees have access rights only to the …

Privileged User

A Privileged User is a user of a computer who is authorized to bypass normal access control mechanisms, usually to be able to perform system management functions. Cybersecurity governance policies …

Administrator Rights

Administrator Rights is the highest level of permission given to a computer user. A user with admin rights (privileges) allows them to access anything within the system or network they …

Least Privilege

Business ownes may feel as though the principle of Least Privilege only applies to government Spooks, however, a simple example – removing administrator rights from all desktop users at a company – could be the difference between ransomware compromise and no incident at all.

Need to Know

Need to Know often gets applied to Classified Top Secret information. However, understanding how it applies could provide insights in how to better protect your SMB’s data and spot errors, omissions, and potentially malicious insiders.