Computer accounts are for you (and only you)
If usernames are shared, account activity is fraudulently represented in audit logs. These audit logs are required for compliance and accountability.
Computer and online accounts were not created to be shared. Each one is used to identify you and your actions on a system uniquely.
What makes accounts secure? Unique usernames/IDs, strong passwords and multiple layers of authentication combine to create secure accounts. Usernames are used for auditing purposes as a digital trail of who did what and when, and why they were allowed to do it. If usernames are shared, account activity is fraudulently represented in audit logs. These audit logs are required for compliance and accountability. Therefore, it is mandatory that everyone log in with the unique username/ID issued to them.
Passwords are strong when they are something only you know. What if you are not the only one who knows your password? What if you used it for more than one account? Likely, those accounts have been or are at risk of being compromised.
Multi-factor authentication is used to create layers of authentication in the event one fails, to ensure the account is not compromised. This could mean using something you have or something you are, such as a phone number or fingerprint to identify you as the owner of the account. These factors are more secure than something you know, such as a password, because another person is less likely to have access to it.
Sharing an account with another person means you are pretending to be them or they are pretending to be you. Additionally, the credentials used are no longer secure because a person can use them to act without the other person knowing about it. This activity becomes a security threat when someone with access is able to misuse, steal or destroy data.
Bottom line: Accounts were created just for you and not to be shared.
Previous article: “What makes a password strong?”