Contact us today!

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 561-795-2000.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Business Computing Google Software Tech Term Cloud Hardware Cybersecurity Malware Windows Hackers User Tips Microsoft Computer Hosted Solutions Mobile Devices Productivity Smartphone Data Backup Cybercrime Browser Data Recovery Efficiency Android Data Security Innovation Apps Operating System Alert Internet of Things Email Mobile Device Management Law Enforcement Ransomware Vulnerability Backup Phishing Business Continuity Outsourced IT Money Business Office 365 Smartphones Disaster Recovery Best Practice IT Support Network IT Support Chrome Saving Money Data IT Services VoIP Microsoft Office Server Managed IT Services Communications Information Information Technology Two-factor Authentication Windows 10 Telephone Systems App Tech Support Cloud Computing Spam Gadgets Collaboration Employer-Employee Relationship Small Business Router Applications Google Drive Windows 10 Computers Upgrade Managed Service Provider Virtualization Managed IT Blockchain Unsupported Software Fraud Commerce WannaCry Holiday Productivity Mobile Security Risk Management Bring Your Own Device Robot Miscellaneous Sports User Error The Internet of Things Social Media Google Assistant VPN iPhone Proactive IT Wi-Fi SaaS Update Cortana Automation Networking Password Data Storage Facebook Shortcut Politics WiFi Hacking BDR OneNote Quick Tips Google Docs Patch Management Wireless Charging Hosted Solution Gmail Devices Save Money Users Audit Avoiding Downtime Data Protection Application Data Breach Wireless Technology Safety Artificial Intelligence Travel Cost Management Managed IT Services Excel Augmented Reality Government Data Management Apple Streaming Media Printing Lithium-ion battery Emergency Sales Proactive IT Solutions Humor Passwords Tablets Maintenance Storage Webinar Social Engineering Access Point of Sale Sync Evernote PowerPoint Consultant Edge Chromecast FAQ Hybrid Cloud Retail Websites Identity Telephony Identity Theft NFL eWaste Remote Monitoring IT solutions Identities Internet Exlporer Wireless Internet Reputation Data Loss Touchscreen Ciminal Data storage Charger Value History Amazon Remote Computing Health Conferencing iOS Data Theft WIndows Server 2008 Data Privacy Uninterrupted Power Supply Workplace Tips Vendor Management Word Device Security Legislation Windows 10s Language HBO Adobe Workers Gamification Project Management Screen Mirroring Software as a Service Settings Computer Care Nanotechnology Wireless Virtual Assistant Search Gifts Computing Hard Drive Mobility Samsung Windows Ink Unified Threat Management Comparison Solid State Drive Laptop DDoS Licensing Updates Meetings Memory Transportation Files Microsoft Excel Emails IT budget Cast Recovery Outlook Root Cause Analysis Computer Forensics Private Cloud Disaster Legal Google Maps Upgrades Spyware Alexa for Business Budget Encryption Credit Cards Computer Fan App store Chromebook Communication Antivirus Specifications Hard Disk Drive Virus IT Management Touchpad Microsoft Word Financial Going Green Social File Sharing Marketing BYOD Administrator Management End of Support Instant Messaging Hacker HaaS Relocation Thank You Cache Scalability Analytics Compliance Keyboard Training Monitors Personal Information Entertainment Black Market Cleaning Congratulations Big Data PDF Automobile Office Television CrashOverride Regulation Managing Stress Company Culture Mobile Computing USB Worker How To Books Text Messaging Scam Mobile Device Education Hiring/Firing Twitter Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Office tips Crowdsourcing Employer Employee Relationship Phone System Bandwidth Advertising Benefits Save Time Computer Accessories Flexibility Music Battery Smart Technology es