{"id":461,"date":"2026-03-21T11:45:13","date_gmt":"2026-03-21T00:45:13","guid":{"rendered":"https:\/\/monash-med74.dyndns.org\/blog\/?p=461"},"modified":"2026-03-31T12:30:33","modified_gmt":"2026-03-31T01:30:33","slug":"safer-computing","status":"publish","type":"post","link":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/2026\/03\/21\/safer-computing\/","title":{"rendered":"Safer Computing"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Desktop and Laptop Accounts<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"436\" src=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/desktop_laptop.jpg\" alt=\"\" class=\"wp-image-462\" srcset=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/desktop_laptop.jpg 640w, https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/desktop_laptop-300x204.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>One of the simplest ways to improve desktop and laptop computer security is to avoid using an administrator account for everyday work.<\/p>\n\n\n\n<p>Administrator accounts have full control of the system, which means that if malicious software is encountered whilst logged into an account with Administrator privileges, the malware can also gain full control.<\/p>\n\n\n\n<p>A safer approach is to use a <em>standard (non-administrator) account<\/em> for normal activities such as browsing the web, email, and documents.<\/p>\n\n\n\n<p><strong>Windows:<\/strong> Windows 10\/11 account management now goes via  <em>Settings \u2192 Accounts \u2192 (Family &amp;) Other users \u2192 Add\/ Create account<\/em>. Whereas Windows 7 goes via <em>Control Panel \u2192 Manage Accounts <em>\u2192<\/em> Create a new account<\/em>, as in the picture below: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"540\" src=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/windows_manage_accounts.jpg\" alt=\"\" class=\"wp-image-553\" srcset=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/windows_manage_accounts.jpg 926w, https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/windows_manage_accounts-300x175.jpg 300w, https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/windows_manage_accounts-768x448.jpg 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/figure>\n\n\n\n<p>Click <em>Add or Create a new account<\/em>, then name the account (such as john_admin in picture), select Administrator as the account type, and click the <em>Create Account<\/em> button. Please protect every account with a password, and then follow the Recommended Approach below.<\/p>\n\n\n\n<p><strong>macOS:<\/strong> Open <em>System Settings \u2192 Users &amp; Groups<\/em>, unlock the panel using the current administrator password, and click Add User, then choose Administrator as the account type.<\/p>\n\n\n\n<p><strong>Linux:<\/strong> A new user can be added through the Users section in system settings, and Administrator privileges assigned to the new user.<\/p>\n\n\n\n<p><strong>Recommended Approach: <\/strong>A useful approach is to create this new administrator account first. After creating it, then log out of the current account and log in to the new administrator account to confirm its existence. Once confirmed by successfully logging in, go again to the Manage Accounts settings, and change your usual everyday account from Administrator to Standard (non-administrator).<\/p>\n\n\n\n<p>This method has an advantage: your normal desktop layout, files, and settings remain unchanged, except that the account you use every day now has fewer privileges. As a result, if malware is encountered, then this will be less likely to infiltrate your system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phone and<\/strong> <strong>T<\/strong><strong>ablet<\/strong> <strong>Security<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"514\" src=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/tablet_phone.jpg\" alt=\"\" class=\"wp-image-463\" srcset=\"https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/tablet_phone.jpg 585w, https:\/\/monash-med74.dyndns.org\/blog\/wp-content\/uploads\/2026\/03\/tablet_phone-300x264.jpg 300w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/figure>\n\n\n\n<p>iPhones, iPads, Android phones and tablets are different from desktop and laptop computers by having only one main owner account with full control of the device.<\/p>\n\n\n\n<p>Because of this, security relies heavily on careful app selection before additional apps are installed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Apps should be installed only from trusted stores such as the Apple App Store or Google Play, and it is wise to avoid downloading apps from unknown websites.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reading reviews and checking the reputation of the developer can help identify suspicious apps.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tools such as ChatGPT can also help as a quick research assistant before installing an unfamiliar app. For example, you might ask whether an app has a good reputation or whether there have been reports of malware. While this can help highlight possible warning signs, it should be treated as general guidance rather than a guarantee.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Message<\/strong><\/h3>\n\n\n\n<p>Desktop and laptop computers improve security by separating everyday users from administrators, while phones and tablets rely on careful app selection and regular system updates to stay safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desktop and Laptop Accounts One of the simplest ways to improve desktop and laptop computer security is to avoid using&hellip; <a class=\"more-link\" href=\"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/2026\/03\/21\/safer-computing\/\">Continue reading <span class=\"screen-reader-text\">Safer Computing<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-461","post","type-post","status-publish","format-standard","hentry","category-tech-talk","entry"],"_links":{"self":[{"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=461"}],"version-history":[{"count":11,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/461\/revisions"}],"predecessor-version":[{"id":556,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/461\/revisions\/556"}],"wp:attachment":[{"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monash-med74.dyndns.org\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}