DatCom Blog

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at 903-842-2220.

The New Version of Chrome has Interesting Changes
VoIP Can Bring A Lot of Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Microsoft Hackers Business Computing User Tips Hosted Solutions Software Tech Term Malware Google Internet Business Innovation Data Backup Backup Hardware Data Email Smartphones Mobile Devices Small Business Communications VoIP Business Continuity Android Data Recovery Workplace Tips Ransomware Managed IT Services Smartphone Computer Cloud Computing Network Cybersecurity Browser IT Services Chrome Alert Outsourced IT Communication Law Enforcement Cybercrime Disaster Recovery Windows 10 Windows 10 Applications Business Management Internet of Things Server Efficiency Router How To Office 365 Money Collaboration Computers Password Windows IT Support Productivity Artificial Intelligence Miscellaneous Spam Facebook Passwords Virtualization Information Gadgets BDR Word Saving Money Telephone Systems Social Media Managed IT Services Productivity Work/Life Balance Voice over Internet Protocol Office Microsoft Office BYOD Two-factor Authentication Mobile Device Management Mobile Device Save Money Connectivity Holiday Flexibility Apps Data Protection Managed Service Operating System Phishing Government App Mobility Data Security Social Engineering Avoiding Downtime Wi-Fi Quick Tips Keyboard Vulnerability Health HaaS Remote Monitoring Human Resources Upgrade Data Storage Servers VPN Entertainment Paperless Office Business Intelligence Settings Private Cloud End of Support Fraud OneNote Update Employer-Employee Relationship IT Management Redundancy Office Tips Public Cloud Remote Computing Bring Your Own Device Managed IT CES Virtual Assistant Google Drive Spam Blocking Data Breach Content Management Telephone System Google Docs IT Plan Software as a Service Bandwidth Sports Comparison Blockchain Data Management Website Unsupported Software Legal Identity Theft Telephony Infrastructure Encryption Windows 7 Scam Networking Smart Office Specifications Microchip Outlook Advertising Video Games Big Data Evernote Recovery Electronic Medical Records Addiction Criminal Emails Software Tips Internet Exlporer Best Practice Value Cryptocurrency Credit Cards Inventory Skype Remote Worker Password Manager Leadership Apple History Experience Charger Title II Solid State Drive Flash Instant Messaging IBM Meetings IT Support HIPAA Search Engine Staff Frequently Asked Questions Wireless Charging Cache Warranty Safe Mode Access Control Start Menu Supercomputer Wiring Business Mangement iPhone Techology Virtual Reality Cleaning HVAC Online Accountants Audit Marketing Budget Machine Learning Millennials Bing Excel Cortana Hiring/Firing Wireless Internet Multi-Factor Security Printer Physical Security Internet exploMicrosoft Hacking Amazon Authentication Tools Devices WiFi Unified Threat Management Gmail Worker Commute Music Computer Care Enterprise Content Management Telecommuting Computer Fan Sync Wireless MSP Google Apps Knowledge Data loss Battery YouTube Workforce Help Desk Digital Signature Tip of the week Users Hybrid Cloud Scalability Travel Black Market Risk Management Wire Trending Mouse Netflix Automobile Firewall Amazon Web Services Nanotechnology Downtime Thought Leadership Mobile Computing Recycling webinar Wearable Technology Password Management Remote Work Practices The Internet of Things Search File Sharing Workers Network Congestion Screen Mirroring Education Training Company Culture Net Neutrality PDF Windows 10s Windows Server 2008 Information Technology Content Patch Management Politics Administrator HBO Online Shopping Smart Tech Root Cause Analysis Botnet How to Current Events Camera eWaste Conferencing Automation Document Management USB Samsung NIST Hosted Computing FENG Augmented Reality IT Consultant Cast Computing Infrastructure Managing Stress FCC Shortcuts Audiobook Bluetooth Television Regulation Printers Save Time Troubleshooting Transportation Books Public Computer Shadow IT Webinar Loyalty Benefits Safety Worker IT solutions Wireless Technology Hosted Solution SaaS CrashOverride Smart Technology Managed Service Provider Rootkit Emergency Employer Employee Relationship Two Factor Authentication Business Owner Computer Accessories Content Filtering Assessment Compliance Twitter Vendor Management