Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

But Users Aren’t That Savvy….NOT!

Posted February 2, 2012    Peter McCalister

BeyondTrust has been doing Privilege Management for over 25 years. I’ve been with the company for over six of them. I’m constantly talking with people about the benefits of running their enterprise users as standard users, rather than administrative ones. Admin users are able to circumvent Group Policy or other security measures, such as installing pirated software that puts the company on the hook for licensing costs or users stealing data from the enterprise with no trace of it happening.

Just this week I spoke with a company that was audited and flagged for lack of licensing due to pirated software. What I hear sometimes in return is, “Ya, but my users aren’t that savvy”. This is a company destined for some bad press.

Let me share with you a little story from my own life. Recently I was at home hanging out with my youngest daughter, she’s six. She started to fall asleep and I’m thinking, 1. What’s better than your kid snuggling up with ya, you parents know what I mean, and 2. Here’s my excuse to doze off myself, hey, it’s only fair.

A little while later when I woke up, I realized my daughter was already up and bounding around like usual. It wasn’t until later when I went to use my iPad I realized something was awry. I was missing icons. At first, before I connected the dots to what icons where missing, I was upset. But then I noticed a new folder had been created. What my daughter had done was create a folder, give it her name and methodically place the games she apparently considers hers into this folder.

I realize this is literally ‘Child’s Play’ to us, but if my six year old is already savvy enough to do that, is it really that much of a leap for older, more educated users with intent to cause damage to your environment? Having seen the results time after time, it is not.

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.