XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at 734-927-6666 / 800-Get-XFER.

A Virtual Private Network Builds Organizational Fl...
VoIP Can Bring A Lot of Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Data Hackers Small Business Hardware Hosted Solutions Google Productivity Mobile Devices Mobile Office VoIP Email Gadgets Malware Quick Tips Network Network Security Efficiency IT Support Innovation Business Management Social Media IT Services Business Smartphones Miscellaneous Business Continuity Server Upgrade Virtualization Communication Windows Disaster Recovery Communications Computer Microsoft Office User Tips Managed IT Services Data Backup Users Mobile Device Management Passwords Browser Android Data Recovery Save Money WiFi Smartphone Marketing Holiday Ransomware Alert Tech Term Mobile Computing Outsourced IT Vendor Management Internet of Things Operating System Chrome Cybercrime BDR Remote Monitoring Windows 10 BYOD Information Technology Computers Avoiding Downtime Bring Your Own Device Cloud Computing Apple Router IT Solutions Going Green Current Events The Internet of Things Artificial Intelligence Best Practice History VPN Automation Telephone Systems Firewall Big Data Remote Computing IT Consultant Trending Health Application Collaboration Hacking Managed IT Services Social Engineering Spam Phone System Printer Cybersecurity Wireless Technology Facebook Employer-Employee Relationship Budget Excel Bandwidth Money App Proactive IT Lithium-ion Battery Office Business Managament Two-factor Authentication Productivity Applications Mobility Fax Server Windows 10 Recovery Unified Threat Management Maintenance Windows 8 iPhone Networking Mouse Business Intelligence Content Filtering How To Tutorials Analytics Virus Apps Phishing PowerPoint Data Protection Value Sports Managed IT Website Customer Relationship Management Data Security Training Information Hard Drives Gmail Private Cloud User Error Antivirus Redundancy Law Enforcement Humor Office 365 Outlook Connectivity Administration Servers Encryption Mobile Device Downtime File Sharing Digital Payment Memory Social Networking Computer Repair Network Congestion Conferencing Google Drive IT Support Administrator Tablet Vulnerability Search Save Time Blockchain Tech Support Word Twitter Office Tips Scam Document Management Streaming Media Risk Management Compliance Identity Theft Inbound Marketing Flexibility Analysis Entertainment Data Management Saving Time IT Management Retail Settings Wearable Technology Human Resources Black Market Fraud Biometrics Spam Blocking CES IT Plan Wireless Physical Security IT service Cleaning Password Virtual Assistant Webinar Video Surveillance Best Available Public Cloud Hacker SaaS Bluetooth Content Management Unsupported Software People Infrastructure Telephone System Data storage Piracy Samsung IBM OneNote Robot Leadership Update USB Access Control eWaste Internet Exlporer Smart Tech Online Currency Data Storage Keyboard Point of Sale Computer Accessories PDF Recycling Comparison Work/Life Balance Data Breach Windows 7 HaaS End of Support Machine Learning Education Safety Wi-Fi Government Statistics YouTube Meetings Workers Social Skype Programming Voice over Internet Protocol Credit Cards Instant Messaging DDoS Paperless Office Managed Service Environment Touchscreen Running Cable Solid State Drive Augmented Reality Intranet Data loss Wiring Knowledge LinkedIn Cameras Wireless Charging Advertising Enterprise Content Management FENG Multi-Factor Security Strategy Net Neutrality Frequently Asked Questions Distributed Denial of Service Files Students Bing Patch Management Licensing Chromecast Hosted Computing Proactive Workforce Virtual Reality Cache Project Management 360 Emails Professional Services WIndows 7 Google Apps Windows 8.1 Update Screen Mirroring Devices GDPR Flash Printer Server Fiber-Optic Shortcut Notifications Password Management Electronic Medical Records Display Lifestyle Business Owner Tip of the week Worker Commute Amazon Colocation Healthcare Help Desk Windows 10s Debate Software as a Service User Laptop Inventory Remote Monitoring and Maintenance Telecommuting Bloatware SharePoint Wireless Internet Warranty Tools Managing Stress Domains Shadow IT IoT Webcam Charger Cast Thought Leadership E-Commerce HIPAA Sync Cables Hybrid Cloud NIST Hiring/Firing Science Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Electronic Health Records Touchpad Line of Business Software Tips Remote Work Entrepreneur Relocation Wire Microchip Hosted Solution PC Care Password Manager Legal Computer Care Tablets Monitor Content Filter Camera 3D Telephony Unified Communications Cryptocurrency Scheduling Macro eBay Windows Media Player Online Shopping Virtual Desktop IT Security Audit Hiring/Firing Google Docs Staff Authentication MSP Cost Management Smart Office Print Server Netflix Alerts Botnet Business Mangement Insurance Co-managed IT Data Warehousing Upgrades Specifications Analyitcs Reputation Storage nternet Crowdfunding Start Menu Theft Safe Mode Remote Support Root Cause Analysis Supercomputer Text Messaging Regulations Evernote Customer Service Internet exploMicrosoft HVAC Computer Fan Digital Signature Nanotechnology Remote Worker Company Culture HBO Search Engine Law Firm IT Work Station Travel Consultant Criminal NarrowBand Practices Gaming Console Millennials Customers Addiction Virtual Private Network Mobile Cortana Uninterrupted Power Supply Accountants Business Technology Audiobook Assessment Scalability Rootkit Politics Television Transportation How to Thank You Troubleshooting Webinar Techology Automobile Public Computer Benefits Congratulations IT solutions Regulation Employer Employee Relationship CrashOverride Smart Technology Utility Computing Books Loyalty Printers Experience Content Two Factor Authentication Battery Emergency Video Games Music Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: