Blog

Why Remove Local Admin Rights?

Cybersecurity measures have improved dramatically over the past decade. As technology platforms and applications have become more sophisticated and complex, so have the security systems and tools that protect them. As new 2nd generation anti-virus software, advanced UTM firewalls, threat detection and response systems, and other protocols are more widely [...]

Read More
The UAC Conundrum

The UAC Conundrum: How to Manage Admin Privilege Without Frustrating Users

For many IT administrators and end-point users, administrative privilege has become a source of friction. Security best practices recommend protecting your privileged accounts by limiting administrative privilege to reduce your attack surface, activating user account control (UAC), and implementing strong password policies and controls. However, these practices aren’t always easy [...]

Read More