Gaining access to administrative rights is one of the most potent weapons for any malicious agent. Entry to these controls allows cyber-criminals to install or change any software on employees’ ...