Least Privilege

6th January 2020 | Cybrary Least Privilege


Least Privilege refers to the access that is given to a user on a device or computer. Giving a user least privilege is to give a user account only the essential functions on the device needed to do their job. Giving a user least privilege helps protect individuals and companies from accidental disclosure of sensitive information, and sometimes the compromise of the computing environment users are operating within.

Why Should “Least Privilege” Matter to an SMB?

One of the best ways to protect your SMB from a major security breach is to implement the principle of Least Privilege by removing Administrator Rights from each employee operating a desktop computer.  This single action can mean the difference between a major ransomware compromise incident and no incident at all.

Why? When your employee is tricked by a hacker into downloading and running malware on their computer, not having Administrative Rights should prevent the malware from installing.  This lack of local computer system rights could prevent the malware from encrypting that users files as well as the files they can access to on network file servers!

Related Terms: Availability, Confidentiality, Integrity, Need to Know, Ransomware

Source: DABCC Inc.

To learn more about this topic, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

That DocuSign Email Probably Isn’t From DocuSign

That DocuSign Email Probably Isn’t From DocuSign

Your inbox sees dozens of emails every day that look completely routine. A DocuSign notification fits right in. A...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more