Why does every employee need their own login?
Shared accounts seem to make sense and many small organizations use them. You can save a few dollars on licensing. It’s easy for two or more people to share a role within your company and overall it may just be more convenient. But convenience also means less control. You can’t implement things like 2 factor authentication, for example, because the second factor would have to be shared across a group of people which isn’t practical (for example, a smartphone to receive texts). One of the biggest downsides is lack of accountability. If something goes wrong, the shared account is used to do something that negatively impacts the business, how do you know who actually did it? You want non-repudiation where possible (the ability to prove that a single person is responsible for an action). Having each user with their own account gives you a lot more visibility and control into your network, resulting in more secure systems and reducing risk to your network and data.
Related Blog Post:
Related Vlog:
Related Resorces:
Want More Resources on This Topic?
[formidable id=10]
Why does every employee need their own login?
Shared accounts seem to make sense and many small organizations use them. You can save a few dollars on licensing. It’s easy for two or more people to share a role within your company and overall it may just be more convenient. But convenience also means less control. You can’t implement things like 2 factor authentication, for example, because the second factor would have to be shared across a group of people which isn’t practical (for example, a smartphone to receive texts). One of the biggest downsides is lack of accountability. If something goes wrong, the shared account is used to do something that negatively impacts the business, how do you know who actually did it? You want non-repudiation where possible (the ability to prove that a single person is responsible for an action). Having each user with their own account gives you a lot more visibility and control into your network, resulting in more secure systems and reducing risk to your network and data.