Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

HoneyBadger

(2,297 posts)
12. No it really can't
Sun Jan 1, 2017, 07:57 AM
Jan 2017

That is exactly the point of admin rights.

Removing admin rights mitigates 97% of critical Microsoft vulnerabilities
Annual "Patch Tuesday" report shows YoY growth of critical Microsoft vulnerabilities

97% of all critical security vulnerabilities reported by Microsoft can be mitigated by removing admin rights, according to new research from security software company, Avecto.

Avecto analyzed data from security bulletins issued by Microsoft throughout 2014, and found that the number of Microsoft vulnerabilities (242) with a critical severity rating increased 65% over the previous year. Furthermore, 80% of all Microsoft vulnerabilities - regardless of severity ranking - could be mitigated by removing admin rights.

The results also revealed that removing admin rights would mitigate 98% of critical vulnerabilities affecting Windows operating systems, 95% of critical vulnerabilities affecting Microsoft Office and 99.5% of vulnerabilities in Internet Explorer.

Microsoft bulletins are issued on the second Tuesday of each month, a date commonly known as Patch Tuesday, and provide solutions for known security issues.

User accounts with admin privileges are primary targets for exploit, as they provide unrestricted access to an endpoint, enabling malware to bury itself deep inside the operating system, cloak itself from detection and then spread more readily across the network. Employees with admin rights have the ability to install, modify and delete software and files. They can also change system settings, potentially introducing even more vulnerabilities.

"Our 2014 analysis highlights the continued benefits of stripping away admin rights," said Paul Kenyon, EVP of Avecto. "Time and time again, the removal of admin rights proves to be a simple and effective threat mitigation strategy - and yet many businesses are still overlooking this fundamental practice."

"There is a misconception that passive tools, like detection technologies, can provide adequate protection, and yet evidence clearly demonstrates that organizations can no longer afford to rely on reactive strategies to deal with the advanced nature of so many attacks."

Kenyon concluded: "Privilege Management is the first step that every organization should be taking to improve the security posture of all of their endpoints. It can mitigate the majority of advanced cyber-attacks, especially when layered with other proactive approaches, such as application control, patch management and sandboxing."

Recommendations

0 members have recommended this reply (displayed in chronological order):

If someone had hooked that computer to the company network, that malware would have been shraby Jan 2017 #1
The question is whether that EVER was even a remote possibility karynnj Jan 2017 #15
They use the malware to fish contacts and jump elsewhere in the network using a colleagues email bettyellen Jan 2017 #28
I understand and that is why I think that you need a utility controlling computer system to be on karynnj Jan 2017 #29
Need but we don't have. It's the kind of human error that allowed the hacks against Dems and bettyellen Jan 2017 #30
We do not know that karynnj Jan 2017 #32
Depends how the lap top was used Yo_Mama_Been_Loggin Jan 2017 #33
That's why I said "we do not Know" rather than It is not true -- karynnj Jan 2017 #34
No, that isn't the question either. Russia was and is trying to Hortensis Jan 2017 #47
"So yes finding a standalone company laptop at the site with code that has been identified as Russia Cha Jan 2017 #2
There is also the testimony our DNI James Clapper sarah FAILIN Jan 2017 #3
Quotes from a libertarian source from mid September -- ie not talking about this at all karynnj Jan 2017 #16
Maybe they should sarah FAILIN Jan 2017 #17
Intentional misunderstanding of my point karynnj Jan 2017 #18
That testimony still shows that the grid is compromised sarah FAILIN Jan 2017 #23
Only if you believe this right wing source and the two right wing sources they link to karynnj Jan 2017 #24
I should have looked further. sarah FAILIN Jan 2017 #25
Sorry for the snark - I should been less rude. karynnj Jan 2017 #26
I think we can all get a little snarky on occasion when things are this serious sarah FAILIN Jan 2017 #38
So I wonder what the chances are that the laptop *has* connected to the network Crash2Parties Jan 2017 #4
exactly nt sarah FAILIN Jan 2017 #6
Exactly. The electric company does NOT say the laptop was never connected pnwmom Jan 2017 #7
Thank you! I've been surprised to read DUers minimizing the significance of this. n/t pnwmom Jan 2017 #5
I am not sure that you understand admin rights HoneyBadger Jan 2017 #8
Great analogy TexasProgresive Jan 2017 #9
I think the LT being ON the network at all is the more important issue, not whether they user from uponit7771 Jan 2017 #10
No it really can't HoneyBadger Jan 2017 #12
I'm not to argue just to argue... my point is without network access it HARDER to do damage uponit7771 Jan 2017 #14
Can you imagine the implications if this happens on a greater scale? smirkymonkey Jan 2017 #11
are we supposed to pretend it *didn't*? LaydeeBug Jan 2017 #20
I'm not quite sure what you mean. smirkymonkey Jan 2017 #21
Strange connections? marked50 Jan 2017 #13
Not likely - the mayor publicly supported Clinton and after the primaries HRC was supported by most karynnj Jan 2017 #19
I guess they never stopped fighting the Cold War NightWatcher Jan 2017 #22
Putin wants revenge for a lot of things. AngryAmish Jan 2017 #46
Nonetheless you will see repeated attempts here and elsewhere to downplay this. Eliot Rosewater Jan 2017 #27
This. bettyellen Jan 2017 #31
Absolutely. Kingofalldems Jan 2017 #39
Lots of Infowars-inspired denial/diversion on DU Hortensis Jan 2017 #48
To spread the Stuxnet virus in Iran,CIA operatives left thumbdrives laying around employees houses. Swede Jan 2017 #35
false equivalence. LaydeeBug Jan 2017 #37
Malware whether on a thumbdrive or a laptop is malware. Swede Jan 2017 #40
Because it attempts to marginalize the cyber WAR that was launched against the USA LaydeeBug Jan 2017 #43
Right on, this country needs to wake up and realize we're in a Cyber War. sarcasmo Jan 2017 #36
Oh, but LaydeeBug, don't you know? There's nothing to see here! Nothing at all! Squinch Jan 2017 #41
K & R Scurrilous Jan 2017 #42
The lack of updates seems to indicate that the article was wrong HoneyBadger Jan 2017 #44
This message was self-deleted by its author LaydeeBug Jan 2017 #49
Russia has full control of our electrical grid. AngryAmish Jan 2017 #45
Oh riiiiiiiiight. sure LaydeeBug Jan 2017 #50
Latest Discussions»General Discussion»Lets be clear, Russian ma...»Reply #12