To ensure that someone cannot gain access to your system by impersonating a user, use passwords that are difficult to guess for user accounts. This is especially important for accounts with administrator permissions. You should also limit the number of accounts that are granted administrator permissions.