A secret most security vendors will not tell you is high-risk users may circumvent traditional network and security compliance controls every day. Because of this, it is important to examine best practices, and take needed action to control high-risk users.