White Paper
Global State of Least Privilege Cybersecurity
WHITEPAPER WHITEPAPER Global State of Least Privilege CybersecurityWHITEPAPER Global State of Least Privilege Cybersecurity 2 Executive Summary Overprivileged users a top challenge for cybersecurity professionals With more than 80 percent of breaches involving the compromise of IT and business user credentials (account IDs and passwords), organizations worldwide are seeking to limit privileged access to services, applications, data, and systems. Cyber criminals target privileged accounts because once compromised, they give the ability to easily move across IT systems and networks undetected. All it takes is one compromised endpoint user with local administrative privileges for a cyber criminal or malicious insider to gain access to sensitive information or even take down the