XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at 734-927-6666 / 800-438-9337.

A Virtual Private Network Builds Organizational Fl...
VoIP Can Bring A Lot of Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Hosted Solutions Managed Service Provider Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Email Network Security Gadgets Quick Tips Efficiency Business Management Network Innovation IT Support IT Services Business Social Media Business Continuity Smartphones Server Miscellaneous Upgrade Virtualization Windows User Tips Communications Communication Disaster Recovery Data Backup Computer Microsoft Office Managed IT Services Data Recovery Smartphone Users Passwords Browser Mobile Device Management Holiday Internet of Things Android Save Money WiFi Marketing Productivity Ransomware Alert Outsourced IT Tech Term Vendor Management Cloud Computing Artificial Intelligence Mobile Computing Cybercrime BDR Operating System Chrome Remote Monitoring Router Windows 10 Computers Avoiding Downtime Automation Bring Your Own Device Apple BYOD Remote Computing Cybersecurity Information Technology The Internet of Things VPN Health Collaboration Current Events History Best Practice Spam Big Data Managed IT Services Going Green Firewall Telephone Systems IT Solutions Application Hacking Phone System Windows 10 Wireless Technology Social Engineering Proactive IT Employer-Employee Relationship IT Consultant Printer Facebook Trending Encryption Bandwidth Money Lithium-ion Battery Excel IT Support App Office Mobile Device Budget Mobility How To Business Managament Recovery Office 365 Applications Fax Server iPhone Maintenance Training Phishing Windows 8 Mouse Content Filtering Networking Business Intelligence Two-factor Authentication Private Cloud Unified Threat Management Tutorials Law Enforcement Virus Access Control Customer Relationship Management Value Sports Save Time Hard Drives Website Information Google Drive Managed IT Gmail Data Protection Antivirus Blockchain User Error Word Settings Apps Analytics Humor PowerPoint Redundancy File Sharing Data Security Outlook Network Congestion Hacker Administrator Conferencing Voice over Internet Protocol IT Management Tablet Search Servers Twitter Machine Learning Inbound Marketing Office Tips Social Document Management Streaming Media Risk Management Tech Support Software as a Service Compliance Analysis Scam Vulnerability Flexibility Paperless Office Administration Entertainment Managed Service Saving Time Business Technology Retail Digital Payment Wi-Fi Connectivity Social Networking Augmented Reality Human Resources Computer Repair Meetings Downtime Memory Identity Theft Data Management Healthcare Piracy Best Available IBM DDoS Display Manufacturing Solid State Drive Data loss Telephone System Leadership Bluetooth Webinar Black Market People Credit Cards Spam Blocking Computer Accessories Samsung Cleaning Password Robot Smart Tech Wireless Physical Security Help Desk USB Public Cloud Online Currency CES Cryptocurrency Fraud Point of Sale IT Plan SaaS Recycling Education Content Management OneNote Data storage Statistics Infrastructure Touchscreen Unsupported Software Internet Exlporer Skype Data Storage eWaste Programming Virtual Private Network PDF Update Instant Messaging Keyboard Environment Safety Running Cable Work/Life Balance Data Breach HaaS End of Support Intranet Video Surveillance YouTube Comparison Government Wearable Technology Telephony Net Neutrality Google Docs Biometrics Virtual Assistant Windows 7 Workers Botnet IT service Theft Shortcuts NarrowBand Data Warehousing Specifications Printer Server Shortcut Inventory Remote Monitoring and Maintenance Digital Signage Start Menu Wireless Internet Warranty Uninterrupted Power Supply Digital Signature Worker Commute IoT Customers Debate Regulations Evernote User Backup and Disaster Recovery Advertising Travel Criminal FENG Bloatware NIST PC Care HBO Knowledge Managing Stress Domains Thought Leadership E-Commerce Mobile Cortana Patch Management Science Electronic Health Records eCommerce 3D Chromecast Millennials Line of Business Scheduling Google Search Distributed Denial of Service Files Wire Microchip eBay Multi-Factor Security Strategy Screen Mirroring Wireless Charging 360 Emails Cryptomining Notifications Electronic Medical Records Entrepreneur Alerts Frequently Asked Questions Content Filter Camera Professional Services Google Apps Windows 10s Tablets Vendor Laptop Workforce Business Owner Authentication MSP ISP Colocation Smart Office Text Messaging Shadow IT Lifestyle Charger Windows Media Player Cast Virtual Desktop Insurance SharePoint IT Security Flash Fiber-Optic Hiring/Firing Gaming Console Database Hybrid Cloud Hiring/Firing Cost Management Safe Mode Work Station Print Server Tip of the week Amazon HIPAA Storage Tools Upgrades Analyitcs HVAC Security Cameras Touchpad nternet Crowdfunding Telecommuting Nanotechnology Remote Worker File Versioning IaaS Remote Support Computing Infrastructure Search Engine Legal Macro Computer Care Customer Service Practices Smartwatch Relocation Sync Cables Hosted Solution Distribution Company Culture Co-managed IT Accountants Monitor Law Firm IT Windows Server 2008 Amazon Web Services Consultant Addiction Password Manager Audit Enterprise Content Management Employee/Employer Relationship Software Tips Remote Work Wiring Multiple Versions Netflix Students Bing LinkedIn Cameras Hosted Computing Proactive Employee Unified Communications Cache Project Management Logistics Staff Root Cause Analysis Reputation Online Shopping Licensing Internet exploMicrosoft Windows 8.1 Update Business Mangement Computer Fan Virtual Reality Password Management Supercomputer WIndows 7 Devices GDPR Webcam Restore Data Emergency Video Games Worker Music Audiobook Scalability Assessment Biometric Security Rootkit Regulation Thank You Politics Transportation How to Television Utility Computing Techology Troubleshooting Webinar Congratulations Printers Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Two Factor Authentication Battery Content

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *