k_Street Consulting, LLC Blog

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at (202) 640-2737.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Mangement Servers VoIP Books Fax Server Hosted Computing Flexibility Webinar Politics Downtime Managed IT Services Electronic Health Records Worker WIndows 7 Chromecast Money Software as a Service File Versioning Unified Communications Quick Tips Windows 10 Uninterrupted Power Supply Redundancy Public Computer Thank You GDPR Google Search Data Backup Holiday eWaste Content Digital Signature Customer Service IT solutions Conferencing Users Backup YouTube Government Cast Analyitcs Telephone Systems Company Culture Rootkit Network Congestion Customers Save Money Files Bluetooth Two-factor Authentication Television Multiple Versions Work/Life Balance Windows 7 CES Flash Colocation Wireless Technology Data Warehousing Running Cable Theft Bring Your Own Device HIPAA Botnet Office analytics Tip of the Week IT Management Shortcut Office Tips Wireless Internet Laptop Electronic Medical Records Chrome Programming Domains Business Computing Apple Spam Blocking Managed IT Services Regulation Environment Transportation Document Management Network Regulations Mobile Devices IT Plan Employee Social Media Line of Business Application Managed Service Software Tips Net Neutrality Business Intelligence Staff Advertising Proactive IT Cloud Remote Work Proactive Google Drive Distributed Denial of Service Internet of Things Criminal Business Owner Productivity Insurance Word Telephony People Connectivity Apps Computer Accessories Read Password Manager IT Solutions IoT Communication Monitor Internet Exlporer Students Safe Mode Specifications Devices Digital Payment Authentication Tablets Smartwatch File Sharing Tools User Voice over Internet Protocol FENG Meetings Workplace Tips Wearable Technology Display Innovation Machine Learning Identity Theft Hosted Solutions Upgrade Loyalty Managed IT iphone Data Security Business Management Netflix Troubleshooting Alert Cybercrime Operating Systems Small Business Smartphone Wire Hosted Solution IT Support Password Video Games Inventory Customer Relationship Management Computer Printers Battery Best Available Internet exploMicrosoft Augmented Reality Vulnerability OneNote Office 365 Archive Windows 10s Content Filtering Infrastructure Robot Intranet Wi-Fi Black Market Saving Time Warranty Online Shopping Point of Sale Gmail Frequently Asked Questions Law Enforcement Thought Leadership Hardware Biometrics Recovery Data loss Scam Disaster Recovery Security Firewall Tablet Computers Mobile Computing Compliance Settings Legal Nanotechnology Google Docs Cables Windows 8 malware DDoS Outlook Remote Monitoring and Maintenance HBO Business Continuity communications Email Human Resources Digital Signage Administration BYOD Best Practices Project Management Notifications Data Storage Multi-Factor Security Google Access Control Artificial Intelligence Efficiency Hard Drives Entertainment Audiobook Save Time Assessment Social Workforce Leadership Enterprise Content Management Microsoft Office Virtual Private Network Printer Server Wiring Update Lifestyle Outsourced IT Science Cache Google Apps Cloud Computing Encryption Humor Marketing IT Consultant App IaaS Cortana Collaboration Accountants Skype Productivity Smart Tech Data storage Retail Employer Employee Relationship Social Networking Current Events Microsoft Healthcare Value Risk Management Private Cloud Keyboard MSP Paperless Office History ISP Computer Care Best Practice Automation Search Engine Bing Ransomware Administrator Bloatware Antivirus Comparison Software Going Green BDR IBM Charger Business Hybrid Cloud Mobile Entrepreneur Practices NarrowBand Miscellaneous Remote Worker Tech Term Screen Mirroring Network Security Education Knowledge Data Management Hackers Computer Fan Windows 10 Relocation Managing Stress IT Support Vendor Management Start Menu Patch Management Evernote Public Cloud Website Credit Cards Printer Hiring/Firing Congratulations Cryptocurrency Training Data Protection How to Smartphones Excel Reputation Hacker SaaS Addiction HVAC Sports Strategy Search Touchpad Operating System Audit Cleaning Vendor Tech Support Cybersecurity Information Technology Mobile Device Maintenance Pain Points USB Storage Technology Emergency Amazon Web Services Mouse Phishing webinar IT Services Cameras Restore Data Privacy Sync Gaming Console Music Server Virtual Desktop Experience Wireless Mobility Data Breach Workers Fraud Smart Office Unsupported Software Internet Amazon Trending Samsung Consultant WiFi Microchip VPN CrashOverride User Tips Content Filter PowerPoint Recycling Camera Information Shortcuts Analysis Passwords LinkedIn Physical Security Employee/Employer Relationship Remote Monitoring Virtual Assistant Gadgets Android SharePoint Twitter Automobile Managed Service Provider Virus The Internet of Things Router Facebook travel Instant Messaging Employer-Employee Relationship Utility Computing Password Management Two Factor Authentication avoiding downtime How To Backup and Disaster Recovery Windows Media Player Root Cause Analysis Windows Health Business Technology Streaming Media Touchscreen Safety Memory Lithium-ion battery Supercomputer Benefits E-Commerce Worker Commute Phone System Solid State Drive Smart Technology Budget User Error Shadow IT Mobile Office Big data Emails Content Management Networking Millennials Blockchain Computer Repair Applications Data Virtual Reality PDF Hacking Data Recovery Fiber-Optic Cost Management Scalability Virtualization Telecommuting Tip of the week Wireless Charging Mobile Device Management Bandwidth Saving Money Telephone System Help Desk Analytic NIST Security Cameras Windows Server 2008 Unified Threat Management Remote Computing Product Reviews Spam End of Support Hring/Firing Professional Services Techology Computing Infrastructure Online Currency IT service eCommerce Browser HaaS Social Engineering Statistics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *