http://www.w3.org/ns/prov#value | - To minimize the possibility of a security breach (viruses, stolen data, identify theft, etc.), best practice is to have an employee operate as a Normal User to reduce the attack surface of his or her computer by eliminating unnecessary privileges that can result in network exploits and computer compromises.
|