A Discussion on Security Improvements For decades, businesses have sloppily adopted and implemented haphazard business practices of over-doing, over-granting IT personnel with unchecked elevated access. This elevated access provides IT personnel with increased capabilities of performing wide-sphere of critical tasks and duties with near-unfettered control and access over IT business assets. IT personnel have not [...]The post Separation Of Duties through a key hole appeared first on DTS.