Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

4 min read

The dangers of admin accounts and best practices for security

Admin accounts are a risk to your business. Find out why and what you can do about them.


The concept of an admin account is both a familiar and crucial element of IT. These accounts are designed to wield great power, allowing users to install software, change system settings, and access sensitive data. However, with great power comes great responsibility—and, unfortunately, the potential for significant peril.

In this blog, we'll explore what an admin account is, why it's dangerous, and how its misuse can lead to dire consequences within an organisation.

 

What is an admin account?

Admin accounts are specialised user accounts on a computer or network system, endowed with elevated privileges compared to a regular user account. These privileges enable users to perform actions that are necessary for the maintenance and configuration of computer systems. Admin accounts are indispensable for IT professionals who need to manage and update systems efficiently. However, offering these powers indiscriminately can lead to severe security vulnerabilities.

Why is it dangerous for everyone to have an admin account?

Imagine a scenario where every employee in a company possesses an admin account as their primary user account. It might seem convenient at first - everyone has the power to troubleshoot their own issues and customise their work environment. However, this setup can quickly turn disastrous if malware finds its way into the network.

Picture this: a seemingly harmless email attachment is opened by an unsuspecting employee, unknowingly unleashing malware. Because everyone has administrative privileges, the malware enjoys unrestricted access to install itself across the entire network. The consequences? Sensitive data can be exfiltrated, system configurations tampered with, and the organisation's operations thrown into disarray. The situation becomes a nightmare and a stark reminder of why admin accounts should be handled with caution.

The difference between local admin and global admin

Within the realm of admin accounts, there are variations worth noting—namely, local admin and global admin accounts. A local admin account provides administrative privileges on a single machine or a limited scope within a network. On the other hand, a global admin account, especially in environments like Microsoft 365, wields control over an entire network or system architecture.

The risks associated with a global admin account are profound. If such an account is compromised, the attacker could potentially have full control over the entire organisation's digital infrastructure. In Microsoft 365, this means access to emails, files, user accounts, and even the ability to impersonate users across the company. Worse still, they could block access for everyone to your Microsoft tenancy. The implications of such a breach are catastrophic, underscoring the necessity for stringent security measures.

How to reduce risks associated with user access and privilege

There are many strategies that can be employed to reduce the risk around user accounts and admin accounts in general. 

  1. Adopt the principle of least privilege

    The principle of least privilege is a fundamental security concept that dictates that individuals, applications, and systems should be granted the minimum levels of access—or permissions—necessary to perform their functions.

    By limiting access rights to the bare essentials, organisations can significantly reduce the risk of unauthorised access to sensitive data and systems, thereby minimising potential damage from security breaches.

    This approach not only helps safeguard critical information but also aids in maintaining compliance with regulatory standards. Schemes like Cyber Essentials mandate this approach.

  2. Use RBAC to limit access

    To implement the principle of least privilege you need to employ Role-Based Access Control (RBAC) which is a method of regulating access to computer or network resources based on the roles of individual users within an organisation.

    It ensures that users have access only to the information and resources necessary for their job functions, thereby minimizing the risk of unauthorized access.

    Implementing the RBAC requires a thorough understanding of user roles and responsibilities to ensure that staff only have access to the information they need. It also requires continuous monitoring and adjustment of access controls to adapt to evolving employment roles and data needs. It's not easy, but it is necessary.

  3. Separate production accounts from admin accounts

    the dangers of admin accounts - 1An effective strategy to mitigate the risks associated with admin accounts is to separate day-to-day user accounts from admin accounts for those who genuinely need administrative privileges. By creating distinct accounts for regular and administrative tasks, the attack surface is significantly reduced. Even if a user's regular account is compromised, the admin privileges remain safeguarded.

    This separation not only enhances security but also cultivates a culture of accountability and mindfulness among users. It encourages responsible usage of admin privileges and ensures that such access is granted only when necessary.

  4. Utilise UAC in Windows

    User Access Control (UAC) is a security feature in Windows that helps prevent unauthorised changes to the operating system by prompting users for permission or an administrator password before allowing actions that could potentially affect the system's operation or other users.

    This feature allows users with separate admin accounts to input their admin credentials when they are needed to carry out specific tasks, without having to log out of their current session and back in with their admin account. 

Together, these techniques provide a layered approach to security, enhancing the protection of sensitive information and maintaining the integrity of systems.

Consider adopting a Zero Trust model

Organisations can adopt a Zero Trust approach; a framework that operates on the principle of "never trust, always verify".

It means that no user or system, whether inside or outside the organisation's network, is automatically trusted. In the context of users and admin privileges, Zero Trust requires strict identity verification for every person and device every time they attempt to access resources on a network.

By implementing Zero Trust, organisations can effectively limit the impact of any security breach.

Conclusion

In conclusion, while admin accounts are a powerful tool in the realm of computing, they are also a potential liability if mismanaged. By understanding their nature, appreciating the risks, and implementing prudent strategies like account separation, organisations can bolster their defences against the ever-evolving landscape of cyber threats. In the digital world, vigilance and thoughtful management of privileges are key components in maintaining a secure and resilient infrastructure.

Next steps...?

If you would like to discuss setting up and managing your user accounts then get in touch with us today. Our team of Edinburgh-based experts can help keep your business and its data safe.

Do you know who has access to your systems

Do you know who has access to your systems

Are you still there? Using a centralised access control system to make sure your systems aren’t accessible by people who have left your company is a...

Read More
How to protect your online accounts from being breached

How to protect your online accounts from being breached

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For...

Read More
How to demonstrate compliance with data security regulations

How to demonstrate compliance with data security regulations

Effective Password Management In this, our final blog in this series on how passwords help you protect your most important business data, we look at...

Read More