In a system architecture, to what extent an admin user should have access to consumer resources?

Let’s say I’m building a system, similar to a very simple ecommerce.
Users can sign up as consumer and start buying products.
Purchases are then stored in the database together with the order status, shipping info, etc.
Now, in order to ma… Continue reading In a system architecture, to what extent an admin user should have access to consumer resources?

Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

Receiving guidance from a contractor that restricting unknown devices (regardless of MFA, location, etc.) to an Azure tenant does not improve security in any meaningful way, and just creates a headache for the administrator who needs to ru… Continue reading Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

Is it possible that a company is able to detect if an employee copies files to a USB drive? [closed]

For a large company using MacOS, is it possible this company is able to detect if an employee copies files to a USB drive?
I haven’t checked to see if system logs log that by default or can log USB getting plugged in and files getting cop… Continue reading Is it possible that a company is able to detect if an employee copies files to a USB drive? [closed]

Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?

If an attacker succeeds in getting the password of an IT support privileged account (that has Domain Control rights), can he successfully carry out the attack and do the lateral movement needed between the Domain Controllers and/or users?
Continue reading Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?