IT professionals must routinely cope with a number of different security threats, but one of the most serious threats is also one of the easiest to overlook. Privilege abuse can occur when a rogue employee, typically an administrator, uses their privileges for an unauthorized purpose.
Privilege abuse can also occur if a legitimate user account is compromised by someone with malicious intent. In either case, privilege abuse is a security threat that must be taken seriously. This paper discusses about ten key steps in detail that IT pros can take to mitigate the threat of privilege abuse.