Contact us today!

FRS Pros Blog

Tip of the Week: Who Should Have Admin Accounts?

Tip of the Week: Who Should Have Admin Accounts?

Depending on their work roles within your organization, your employees will either have an ordinary user account or an administrator account. This can be one of the more stressful parts of managing a network, as the answer for who gets administrator access isn’t always clear. We’ll explain what an admin account is and why it’s important to have restraint when looking at who should have an admin account.

Why is an Admin Account Such a Big Deal?
An administrator account is basically the highest level of privilege that you can give to someone on your network. Compared to the traditional user account, an admin account can do much, much more--and this isn’t necessarily a good thing. Keeping more traditional accounts than administrator accounts is a best practice because it minimizes risk to your network. This keeps an ordinary user from making drastic changes to a network, like installing software or moving important files around.

Admin accounts can perform just about any action they want on a computer. Think of it as the way IT accesses a computer, as they need these permissions to apply updates and administer general maintenance. Every computer needs to have at least one admin account on it, but untrained users should not have admin permissions, as this could result in file changes that prevent the computer from working as intended.

Why You Need to Limit Admin Account Use
It might make sense to have admin permissions for your own computer account, but it’s actually not in your best interest. This is because there are major security problems that come from using an admin account as your primary device account. If the device is compromised in some way, the account could install malware with administrator privileges or make changes to important files. Even if you think you’ll need the extra privileges, we assure you that you don’t in almost any circumstance--at any rate, the security detriment isn’t worth it.

Standard accounts will generally have more limited permissions, which means that a compromised account will only yield certain permissions, not the entirety of the computer. This is why we suggest limiting administrator accounts only to whoever is in charge of IT.

If your business needs someone to manage its IT solutions, FRS Pros can help. To learn more, reach out to us at 561-795-2000.

Are You Prepared to Weather Any Disaster?
What Could Possibly Be Wrong with Your Computer?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google User Tips Cloud Business Management Productivity Tech Term Hackers Software Hardware Microsoft Hosted Solutions Mobile Devices Browser Data Backup Computer Malware Smartphone Windows 10 Innovation Cybersecurity Efficiency Windows IT Services Android Data Recovery Data Security Office 365 Email Smartphones Outsourced IT Internet of Things Cybercrime Data Upgrade Apps Backup Business Continuity Communication Operating System IT Support VoIP Communications Mobile Device Management Small Business Vulnerability Saving Money Business Money Phishing Alert Server Disaster Recovery Law Enforcement Ransomware Best Practice Users Employer-Employee Relationship Cloud Computing Spam Applications Chrome Microsoft Office Collaboration Network Virtualization Managed IT Services Passwords Information Miscellaneous Social Media IT Support Gadgets Workplace Tips Unsupported Software Facebook App Router Blockchain Automation Two-factor Authentication Google Drive Windows 10 Save Money Computers Holiday Networking OneNote Artificial Intelligence Information Technology Managed Service Provider Managed IT Telephone Systems Bring Your Own Device Managed IT Services Tech Support Augmented Reality BDR Google Assistant Travel Commerce WannaCry Hybrid Cloud Password Health Excel Fraud Quick Tips Application Hosted Solution Encryption SaaS Business Technology Avoiding Downtime Mobility Hacking Proactive IT Search Evernote Gmail User Error Safety Touchscreen Data Storage WiFi Cortana Mobile Device Risk Management Word Budget Government Conferencing Wireless Technology Audit Data Management Meetings Managed Service Google Docs Project Management Wi-Fi Data Protection Access Control Robot Patch Management Wireless Charging Devices Update Shortcut Productivity Mobile Security Politics The Internet of Things Sports Cost Management IT Management VPN iPhone Data Breach Break/Fix Google Maps Spyware Scam Chromecast Marketing BYOD Hyperlink Reputation Credit Cards App store Data storage Microsoft Word Identity History Specifications Virus Telephony Machine Learning Employee-Employer Relationship File Sharing Samsung Internet Exlporer IT Solutions Wireless Internet Saving Time Remote Computing Medical IT Apple Webinar Value Wasting Time Settings Tablets Maintenance Consultant Data Privacy Windows 7 Wireless Sales Proactive Legal Uninterrupted Power Supply Amazon Downtime Remote Monitoring Storage Social Engineering Antivirus Gamification Keyboard Shortcuts Sync Software as a Service Laptop Edge IT solutions Accessory Transportation FAQ Virtual Assistant E-Commerce NFL eWaste Hard Drive Display Private Cloud Retail Websites Hacker Files Testing Identities DDoS iOS WIndows Server 2008 Memory Human Resources Emergency Disaster Bandwidth Touchpad Data Loss Ciminal Recovery Windows 10s HBO Computer Forensics Peripheral Going Green Social Charger Alexa for Business Payment Cards Device Security Point of Sale Screen Mirroring Chromebook Co-Managed Services Data Theft Computer Care Nanotechnology Adobe Workers Unified Threat Management Camera Legislation Language Entertainment Financial Payroll Humor Identity Theft Administrator Solid State Drive Management Employee Windows Ink Streaming Media Emails Cast Printing Telephone Gifts Computing Lithium-ion battery Root Cause Analysis Licensing Updates Upgrades Projects Personal Information Comparison Computer Fan Security Cameras Vendor Microsoft Excel IT budget Vendor Management Access Hard Disk Drive PowerPoint Admin Outlook Compliance PDF How To Books Education Hiring/Firing Printers Mobile Computing Video Games Experience Congratulations Virtual Reality Cache Work/Life Balance es Regulation Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Training Monitors Save Time Television CrashOverride Office tips Computer Accessories Twitter Advertising Battery Smart Technology Flexibility Music Company Culture Instant Messaging Scalability Analytics Keyboard HaaS End of Support Black Market Cleaning Relocation Automobile Office Big Data Managing Stress Thank You USB Worker