The line between standard and privileged users is blurring as the standard user often has access to sensitive data and can perform high-risk actions as part of their daily activities, making them ripe targets for cyber threats. Here's what to know and what to do.