In this piece, Jake Williams, President of Rendition InfoSec, discusses the importance of admin rights removal when it comes to mitigating Microsoft's growing number of Critical vulnerabilities, and shares why UAC is not a comprehensive security control.
With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.
In the era of next-gen technology, it's the often-forgotten basics that provide the best foundations. By reducing the attack surface and building secure defensible endpoints you'll be in a far better position to stop cyber attacks and keep your data safe.
Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.
Now in its third year, the 2015 Microsoft Vulnerabilities Report analyses the data from Security Bulletins issued by Microsoft throughout 2015. Typically issued on the second Tuesday of each month, these “Patch Tuesday” bulletins contain fixes for vulnerabilities affecting Microsoft products. With the launch of Windows 10, this approach changed slightly, with patches being released as soon as they are available.
Following on from last year, Avecto have analyzed Microsoft vulnerabilities in 2014 to reveal how the removal of admin rights is more important than ever.
Privilege abuse can cause significant issues for any enterprise. In this blog we take a closer look at issue of controlling admin rights and why removing them from your enterprise can mitigate 97% of Microsoft critical vulnerabilities.
Unconvinced about the importance of removing user admin rights? Read on for some compelling reasons why user privileges should be at the top of your security agenda in 2014.