Blog intro video: How to empower end users without compromising security