DatCom Blog

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at 903-842-2220.

The New Version of Chrome has Interesting Changes
VoIP Can Bring A Lot of Value
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Hackers Microsoft Tech Term Mobile Devices Internet Business Software Malware Backup Hardware Productivity Innovation Data Backup Smartphones Data Communications VoIP Email Workplace Tips Cloud Computing Android Data Recovery Small Business Smartphone Business Continuity IT Services Disaster Recovery Managed IT Services Ransomware Router Cybersecurity Communication Computer Law Enforcement Alert Windows 10 Windows 10 Outsourced IT Cybercrime Network Artificial Intelligence Browser Internet of Things Efficiency Chrome IT Support Office 365 Computers Password Money Collaboration Windows How To Miscellaneous Server Gadgets Applications Business Management Mobile Device Saving Money Social Media BDR Spam Productivity Telephone Systems Facebook Passwords Managed IT Services Wi-Fi Information Word Virtualization Holiday Data Protection Flexibility Apps Vulnerability Mobility Social Engineering Quick Tips Health Settings Mobile Device Management Avoiding Downtime Private Cloud Office Keyboard Encryption Work/Life Balance Phishing Connectivity Voice over Internet Protocol Managed Service Operating System Data Security Microsoft Office Save Money Government App Two-factor Authentication BYOD Telephone System Telephony Remote Computing Unsupported Software Windows 7 CES Managed IT Data Breach Software as a Service Sports Automation Data Storage Content Management Bandwidth Google Docs OneNote Redundancy Data Management Employer-Employee Relationship IT Management Comparison Blockchain Identity Theft Scam Legal Networking Website Servers Infrastructure Remote Monitoring Paperless Office End of Support Google Drive Human Resources HaaS Public Cloud Office Tips Spam Blocking VPN Upgrade Entertainment Machine Learning Virtual Assistant IT Plan Business Intelligence Fraud Access Control Bring Your Own Device Botnet Update Google Search FENG Cortana Hiring/Firing Wire Mouse Conferencing Millennials Information Technology Amazon Authentication Hacking Thought Leadership Mobile Computing IT Consultant Cast Multi-Factor Security Music Computer Care Password Management Security Cameras Telecommuting Worker Commute File Sharing WiFi Gmail Company Culture Outlook Battery Proactive IT Skype Travel Google Apps Risk Management Scalability Administrator Emails Software Tips Workforce Digital Signature Firewall Hacker Solid State Drive Flash Amazon Web Services Nanotechnology Automobile Camera Leadership Trending Wearable Technology Black Market NIST Remote Work Practices Patch Management Augmented Reality Meetings Recycling Training Search Managing Stress Shortcuts Frequently Asked Questions Advertising Education Start Menu Workers Politics Content Smart Office Microchip Internet Exlporer Net Neutrality PDF Cryptocurrency Smartwatch Audit Online Shopping Smart Tech Current Events Addiction Apple USB Samsung Hosted Computing Document Management Remote Worker eWaste How to Social Excel Big Data Computing Infrastructure Tools Audiobook Search Engine Physical Security FCC Safe Mode Employee Computer Fan Sync Marketing Evernote Electronic Medical Records Video Games Cache Warranty iPhone Techology Specifications Value Credit Cards Inventory Best Practice IBM Save Time Wiring Knowledge Data loss Criminal Experience Charger Recovery HVAC Vendor Tip of the week Title II History Downtime Password Manager HIPAA Instant Messaging Bing Netflix Internet exploMicrosoft Digital Signage The Internet of Things Wireless Wireless Charging Wireless Internet Printer webinar Staff IT Support Windows Server 2008 Users Hybrid Cloud Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Cleaning Enterprise Content Management Display Windows 10s Online Accountants Virtual Reality MSP Root Cause Analysis Business Mangement Budget YouTube Help Desk HBO Hosted Solution SaaS Smart Technology Wireless Technology Emergency Rootkit Compliance Employer Employee Relationship Two Factor Authentication Twitter Business Owner Content Filtering Assessment Regulation ISP Computer Accessories Webinar Printers Vendor Management Television CrashOverride Bluetooth IT solutions Troubleshooting Transportation Safety Books Public Computer Managed Service Provider Loyalty Benefits Shadow IT Worker