This paper discusses that while limiting user privileges on end-points is a best practice, it is not a replacement of additional layers of security
Cybercriminals and Administrative Users
- January 9, 2020
- Webmaster Global
- Expert Editor - IT Management
Signup for Thought Leader
Get the latest IT management thought leadership delivered to your mailbox.
Related:
- Balanced Scorecard Strategy Map Sample - Finance and Administrative Services
- BPM and SOA: Where Does One End and the Other Begin?
- Social Networking and Its Effects on Companies and Their Employees
- Comparing the DeLone and McLean Model and the Work System Method
- Security and control: The smarter approach to malware and compliance