Least Privilege

6th January 2020 | Cybrary Least Privilege

Least Privilege refers to the access that is given to a user on a device or computer. Giving a user least privilege is to give a user account only the essential functions on the device needed to do their job. Giving a user least privilege helps protect individuals and companies from accidental disclosure of sensitive information, and sometimes the compromise of the computing environment users are operating within.

Why Should “Least Privilege” Matter to an SMB?

One of the best ways to protect your SMB from a major security breach is to implement the principle of Least Privilege by removing Administrator Rights from each employee operating a desktop computer.  This single action can mean the difference between a major ransomware compromise incident and no incident at all.

Why? When your employee is tricked by a hacker into downloading and running malware on their computer, not having Administrative Rights should prevent the malware from installing.  This lack of local computer system rights could prevent the malware from encrypting that users files as well as the files they can access to on network file servers!

Related Terms: Availability, Confidentiality, Integrity, Need to Know, Ransomware

Source: DABCC Inc.

To learn more about this topic, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more