XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

What’s the Big Deal?
You would think that assigning administrator accounts would prevent users from making poor choices with your data. The main difference between the two is that administrator accounts have many more privileges compared to the traditional account used by the average user. In fact, a traditional account is much safer to use unless you actually need administrator access to perform a certain task. Ordinarily, a normal user account can’t install software or mess around with important files in the system, but this isn’t necessarily the case for an administrator account.

Admin accounts are essentially the most powerful account on your computer. They have the permissions to perform just about any role on your PC. It’s the same role that your IT department uses to make any significant changes to your devices during updates and general maintenance. Every computer needs to have at least one admin account found on it, but if access from untrained users is allowed, they could make changes to important files needed for the computer to run properly.

Why You Should Limit Admin Account Use
While it might make sense to have admin permissions if you’re the only one who uses your computer, this is simply not the case on a managed network. There are security problems associated with using an admin account as your primary device account. What happens if your account gets compromised by some sort of malware? It’s simple; the malware will install on your admin account and be able to make any changes it wants to any of the important files only accessible by your admin account. While more permissions as the device owner might sound ideal, it only makes it easier for threats to leave a lasting effect on a device.

Standard accounts have more limited permissions, meaning that if they are compromised in any fashion, they will be more limited in the amount of damage they can cause. It’s for this reason that it’s best to limit administrator accounts as often as possible, as there is no guarantee you will never fall victim to such attacks.

To minimize the chance of your business’ endpoints falling prey to attacks, you should implement proactive measures against the countless possibilities out there--including a compromised admin account. To learn more about how your business can protect itself, reach out to us at 734-927-6666 / 800-Get-XFER.

A Virtual Private Network Builds Organizational Fl...
VoIP Can Bring A Lot of Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network IT Support Innovation IT Services Social Media Business Management Business Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Disaster Recovery Data Backup Communications Computer Microsoft Office Managed IT Services Smartphone Users Browser Mobile Device Management Data Recovery Passwords Android Holiday WiFi Marketing Save Money Ransomware Alert Outsourced IT Tech Term BDR Cybercrime Vendor Management Internet of Things Mobile Computing Chrome Operating System Cloud Computing Remote Monitoring Windows 10 Router BYOD Computers Information Technology Automation Avoiding Downtime Artificial Intelligence Bring Your Own Device Apple Going Green History Best Practice Managed IT Services Spam Telephone Systems Cybersecurity Big Data VPN Remote Computing Firewall IT Solutions The Internet of Things Current Events Application Collaboration Hacking Social Engineering Printer Facebook Employer-Employee Relationship Trending Phone System Wireless Technology Health IT Consultant Money Proactive IT Excel Bandwidth App Productivity Office Lithium-ion Battery Windows 10 Mobility Budget Mobile Device Maintenance Recovery Windows 8 Unified Threat Management Business Intelligence How To Networking Office 365 iPhone Applications Mouse Business Managament Phishing Two-factor Authentication Content Filtering Fax Server IT Support Managed IT Apps Access Control PowerPoint Antivirus Private Cloud Website Redundancy Law Enforcement User Error Information Analytics Gmail Encryption Customer Relationship Management Humor Training Hard Drives Data Protection Outlook Blockchain Tutorials Settings Word Virus Google Drive Sports Value Data Security Twitter Vulnerability Digital Payment Document Management Voice over Internet Protocol Social Networking Computer Repair Tech Support Streaming Media Risk Management Save Time IT Management Wi-Fi Servers Scam Office Tips Data Management Saving Time Machine Learning Administrator Compliance Software as a Service Analysis Flexibility Downtime Entertainment File Sharing Memory Managed Service Inbound Marketing Retail Social Connectivity Human Resources Conferencing Search Network Congestion Hacker Tablet Identity Theft Administration Online Currency eWaste Recycling Internet Exlporer Point of Sale Telephone System Data Storage Education Keyboard PDF Credit Cards Video Surveillance Statistics Work/Life Balance Data Breach USB HaaS End of Support Robot Safety Government YouTube Smart Tech Meetings Programming Workers IBM CES Skype Fraud Piracy Leadership IT Plan DDoS Augmented Reality Intranet Running Cable Computer Accessories Wearable Technology Content Management Solid State Drive Data loss Infrastructure Unsupported Software Black Market Paperless Office Spam Blocking Instant Messaging Wireless Physical Security Display Environment Update Cleaning Password Best Available Bluetooth Public Cloud Telephony SaaS Webinar Biometrics Comparison People Windows 7 Touchscreen Google Docs Samsung Virtual Assistant IT service Help Desk Botnet OneNote Data storage User Start Menu Theft IaaS Computing Infrastructure Healthcare Shortcuts Worker Commute Data Warehousing Specifications Touchpad Inventory Remote Monitoring and Maintenance Regulations Evernote Relocation Wireless Internet Warranty Hosted Solution Bloatware Digital Signature Legal IoT Computer Care Managing Stress Domains IT Security Thought Leadership E-Commerce Science Travel Criminal NIST HBO Monitor Line of Business Mobile Cortana Electronic Health Records eCommerce Audit Millennials Print Server Wireless Charging Remote Support Wire Microchip Netflix Entrepreneur Webcam Multi-Factor Security Strategy nternet Crowdfunding Reputation Content Filter Camera Tablets Macro Cryptocurrency Root Cause Analysis Frequently Asked Questions Law Firm IT Authentication MSP Supercomputer Hiring/Firing Professional Services Google Apps Internet exploMicrosoft Co-managed IT Company Culture Vendor Computer Fan Windows Media Player Virtual Desktop Workforce Flash PC Care Fiber-Optic Smart Office Cost Management Lifestyle NarrowBand Insurance Amazon Customers Storage Upgrades Analyitcs Scheduling Uninterrupted Power Supply LinkedIn Safe Mode Tip of the week 3D Nanotechnology Remote Worker Knowledge Tools Advertising Net Neutrality HVAC Security Cameras FENG Customer Service Telecommuting eBay Consultant Sync Cables Alerts Distributed Denial of Service Files Windows 8.1 Update Search Engine Patch Management Chromecast Practices Windows Server 2008 Amazon Web Services Addiction Virtual Private Network 360 Emails Accountants Business Technology Screen Mirroring Debate Wiring Password Manager Notifications Enterprise Content Management Electronic Medical Records Cameras Software Tips Remote Work Text Messaging Licensing Unified Communications Work Station Colocation Students Bing Windows 10s Gaming Console Laptop Hosted Computing Proactive Business Owner Online Shopping SharePoint Cache Project Management Virtual Reality Staff Shadow IT Charger Cast WIndows 7 Devices GDPR HIPAA Business Mangement Hybrid Cloud Password Management Hiring/Firing Printer Server Shortcut Automobile Public Computer Benefits Smartwatch Thank You IT solutions Employer Employee Relationship CrashOverride Smart Technology Congratulations Books Regulation Loyalty Experience Content Two Factor Authentication Battery Utility Computing Emergency Video Games Printers Music Worker Audiobook Scalability Assessment Rootkit Politics Employee/Employer Relationship Transportation How to Television Troubleshooting Webinar Techology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *