Contact us today!

FRS Pros Blog

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 561-795-2000.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Tech Term Business Management Google Cloud Business Computing Software User Tips Hackers Hardware Malware Computer Browser Microsoft Mobile Devices Windows Cybersecurity Efficiency Data Backup Hosted Solutions Apps Smartphone Innovation Cybercrime Productivity Operating System Internet of Things Outsourced IT Android IT Services Windows 10 Data Recovery Smartphones Data Security Upgrade Law Enforcement VoIP Ransomware Phishing IT Support Office 365 Backup Data Business Mobile Device Management Money Email Business Continuity Vulnerability Alert Collaboration Disaster Recovery Network IT Support Server Best Practice Chrome Communications Microsoft Office Saving Money Managed IT Services Passwords Virtualization Telephone Systems Managed Service Provider Tech Support Employer-Employee Relationship Router Gadgets Applications Managed IT Google Drive Unsupported Software App Small Business Cloud Computing Spam Information Windows 10 Blockchain Two-factor Authentication Computers Information Technology Touchscreen Data Storage Wi-Fi Robot Miscellaneous WiFi Update Budget User Error Mobile Device OneNote Shortcut Politics Wireless Technology The Internet of Things Social Media Workplace Tips Data Management VPN iPhone Cortana BDR Networking Audit Data Protection Productivity Facebook Users Sports Quick Tips Google Docs Cost Management Project Management Managed IT Services Application Hosted Solution Patch Management Wireless Charging Devices Augmented Reality Automation Avoiding Downtime Password Safety Commerce WannaCry Managed Service Data Breach Hacking Communication Holiday Artificial Intelligence Mobile Security Risk Management Gmail Bring Your Own Device Travel SaaS Government Excel Proactive IT Save Money Fraud Google Assistant Maintenance Recovery Humor Identity Sales Proactive Disaster Identity Theft Hybrid Cloud Tablets Employee-Employer Relationship Storage Social Engineering Wireless Internet Sync Evernote iOS WIndows Server 2008 Edge Value FAQ Windows 10s HBO NFL Computer Care eWaste Nanotechnology Administrator Data Privacy Windows 7 Retail Websites Screen Mirroring Vendor Management Amazon Streaming Media Business Technology Unified Threat Management Identities Lithium-ion battery Scam Reputation Gamification Software as a Service Data Loss Ciminal Meetings History Charger Solid State Drive Data storage Word Device Security Root Cause Analysis Access Hard Drive Display Conferencing Emails Data Theft Cast Samsung Remote Computing Health Virtual Assistant Chromecast Testing Legislation Upgrades Language Memory Adobe Workers Computer Fan Bandwidth Telephony Wireless Computer Forensics Hard Disk Drive IT Management Legal Settings Windows Ink Encryption Internet Exlporer Mobility Chromebook Co-Managed Services Gifts Marketing Computing BYOD Antivirus Search Alexa for Business Laptop Camera Comparison Transportation Financial Licensing Updates Microsoft Excel IT budget Uninterrupted Power Supply Private Cloud Management Outlook IT Solutions Google Maps Spyware Printing Telephone Credit Cards Webinar App store Emergency Touchpad Projects Specifications Consultant Virus Going Green Social Microsoft Word Vendor File Sharing Remote Monitoring Point of Sale PowerPoint Apple DDoS Hyperlink IT solutions Files Company Culture Black Market Cleaning Printers Relocation Automobile Office Big Data Managing Stress Personal Information Wasting Time Regulation USB Worker How To Books PDF Thank You Education Hiring/Firing Mobile Computing Twitter Accessory Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship Congratulations Benefits Peripheral Phone System Save Time Office tips Computer Accessories Cache Battery Smart Technology Flexibility Music Advertising Instant Messaging Hacker Training Monitors es Scalability Analytics Television CrashOverride Keyboard HaaS Entertainment End of Support Compliance