Myth Busters has become a TV phenomenon with great antics to prove or disprove commonly head “truths” as “urban legend, wife’s tale or grounded in fact-based truth. In today’s enterprise a common myth is that no one ever actually misuses the information technology (IT) privileges granted them. We thought we take a closer poke at this and bust it wide open.
What we have to understand:
- What are those IT privileges?
- How would they be misused?
- Why would they be misused?
- How would I know if they are in fact being misused at all?
IT privileges are the electronic authorizations granted a user or resource to accomplish tasks on their PC, laptop, server or network device (physical, virtual or cloud-based).