Opening Our Network Security Playbook Part 4

Opening Our Network Security Playbook Part 4

LIMIT END USER RIGHTS - When I get the opportunity to speak at industry events I talk about our security best practices a good amount. The concept of running the users that we support without administrative level privileges definitely raises eyebrows. In some cases this can create more work for us because our end users have to submit a ticket in order for software to be installed or updated. In many cases we can handle the updates / installs with our RMM tool (Remote Monitoring and Management) with a few simple clicks. In the cases where automation is not possible we will contact the end user and white glove the installation. Some providers would rather not deal with software installs, however we would much rather process a ticket to install something legit compared to removing malware or Ransomware from an entire client network.

www.stfconsulting.net/why-stf-consulting/

Source: https://www.linkedin.com/pulse/opening-our-network-security-playbook-part-4-sean-furman?trk=mp-reader-card