Cyber Awareness Month
This is the process of gaining more authority, access, and permissions on an IT system. For attackers the goal is to "Pwn" (own) the system. So how do we control privilege and why do we segregate out networks?
Find out why:
- Patching is key to limit the available exploitation methods.
- You should audit and review your estate permissions.
- Privileged Identity Management and other administrator limiting tools are good.