The term User Hardening has its origin in the Hardening processes that are commonly applied to organizations and consist of securing an operating system, server, or application, reducing its vulnerabilities or security holes.
As users are also part of the information systems of organizations and have their own vulnerabilities —which are exploited daily by cybercriminals around the world— it is necessary that they also go through a Hardening process.
This Whitepaper shows how to conduct, step by step, a continuous User Hardening process.