Maybe, but that's for a different tutorial. If your SSH private keys are secure, users are a waste of time and keystrokes and add layers of complications to otherwise simple tasks, especially for servers maintained by a single person. If you are trying to save a server from crashing in a downward spiral, seconds count.
If your only authentication method is via private keys, with a passphrase, restricted to certain IP addresses, on a non-default port, you won't have a problem administrating your server as root.
This is infinitely more secure than allowing the world access to SSH, and then hoping that if(when) they get user access, they are too dumb to load malware from bash or snoop for vulns.
To extrapolate my point, your comment suggests that to be secure, you'd also need to shut down your steemit user login (root) to protect your SBD or SP (root's money), and then create a sub user (not currently possible), because that's the only way to be safe.
RE: FIVE minutes to a safer Ubuntu experience for noobs AND pros.