Do common centralized IT access policies create any security risks, and are there alternatives?
Many large companies have IT policies where even low-level IT employees have privileges such as remote access to any company computer (often automatic, able to override user denial, or even silent), or administrative access to any company …