There’s an emphasis on the damage unauthorized users cause to computer systems and networks, but that’s only one side of the cyberattack coin. Users with legitimate access also pose a threat. If you don’t lock your doors, an intruder can sneak in. Similarly, unhealthy access privilege practices create loopholes that intruders exploit.