Online Help
24 July 2025 | 11:12 am

When it comes to IT security, sometimes the simplest changes can make the biggest difference. One of the most common (and risky) mistakes we see is allowing everyday users to log in with administrator rights.

Why is this a problem?
Because having admin privileges means you can download, install, or change almost anything on your computer — often without realising the security risks. And if a cybercriminal gains access to your account, they can do the same.

What Are Admin Rights?

Administrator rights are the highest level of permissions on a computer. They allow you to:

Install or uninstall software

Change system settings

Create or delete user accounts

Make modifications that affect the whole machine

In comparison, a standard user account is limited to day-to-day tasks, like browsing the web, using applications, or editing files — but it can’t make major changes to the system.

Why You Shouldn’t Use an Admin Account for Everyday Work

Here’s why it’s risky to run your daily operations with admin access:

1. Increased Risk from Malware and Viruses

If malware infects a device logged in as an administrator, it has full control to install harmful programs, encrypt files, or even spread across your network.

2. Accidental Changes

Even well-meaning employees can accidentally uninstall a critical program or change settings that cause problems. Limiting permissions reduces the risk of unintentional errors.

3. Phishing Attacks Become More Dangerous

Cybercriminals often trick users into downloading files or clicking malicious links. If the user has admin rights, the malicious program installs without resistance.

4. Compliance and Data Security

Many security frameworks, including Cyber Essentials, recommend limiting admin rights to reduce the “blast radius” of any breach.

What’s the Right Way to Manage It?

The golden rule:

Your main user account should be a standard account, and a separate admin account should be used only when necessary.

Steps to implement this:

Create a dedicated admin account (with a strong password).

Set all regular user accounts to “standard” — including yours.

Prompt for the admin login whenever software installation or critical settings need to be changed.

Review permissions regularly to ensure no unnecessary admin rights are creeping in.

Practical Example

Imagine this scenario:
An employee receives a phishing email that looks like a software update. They click “Install” — and because they have admin rights, the malware installs itself silently and spreads to other devices.

If that user had standard access, the malicious software would trigger a prompt for admin credentials — stopping the attack in its tracks.

Make It a Company-Wide Policy

This isn’t just a good practice for IT teams; it’s essential for every business:

Enforce least privilege access — users only get the rights they need.

Educate employees on why admin rights are restricted.

Work with your IT provider (or us at Liit) to ensure proper account management.

Need Help Locking Down Your IT Security?

If you’re unsure who has admin rights on your systems, or you suspect it’s “everyone,” it’s time for a quick review.

We can help you implement:

A clear permissions policy

User account audits

Practical security measures to reduce risk

Call us on 01442 933356 or visit liituk.com/contact-us to schedule a no-pressure IT security review.