­

Why Remove Local Admin Rights?

Cybersecurity measures have improved dramatically over the past decade. As technology platforms and applications have become more sophisticated and complex, so have the security systems and tools that protect them. As new 2nd generation anti-virus software, advanced UTM firewalls, threat detection and response systems, and other protocols are more widely [...]

Read More
The UAC Conundrum

The UAC Conundrum: How to Manage Admin Privilege Without Frustrating Users

For many IT administrators and end-point users, administrative privilege has become a source of friction. Security best practices recommend protecting your privileged accounts by limiting administrative privilege to reduce your attack surface, activating user account control (UAC), and implementing strong password policies and controls. However, these practices aren’t always easy [...]

Read More

The Problem with Privilege: 3 Dangers of Privileged Access

Every organization needs a secure solution that enables users to access critical information, make changes to the network, and configure security measures when necessary. These tasks are carried out using privileged accounts access all of the organization’s administrative functions, including installation and removal of software, changes to the operating system, [...]

Read More