Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 561-795-2000.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Cloud Business Computing Tech Term Business Management Google Hackers Hardware Software User Tips Microsoft Malware Computer Productivity Efficiency Browser Data Backup Smartphone Hosted Solutions Mobile Devices Cybersecurity Windows IT Services Apps Internet of Things Office 365 Android Data Recovery Innovation Cybercrime Data Security Upgrade Operating System IT Support Outsourced IT Email Windows 10 Backup Data Business Continuity Smartphones Alert Phishing Law Enforcement Disaster Recovery Ransomware VoIP Mobile Device Management Vulnerability Money Business Network Server Microsoft Office Employer-Employee Relationship Best Practice Applications Communications Chrome Spam Small Business IT Support Managed IT Services Collaboration Workplace Tips Saving Money Computers Information Technology Virtualization OneNote Passwords Miscellaneous Information Managed Service Provider Telephone Systems Managed IT Gadgets Tech Support Router Unsupported Software Holiday Google Drive Blockchain App Two-factor Authentication Cloud Computing Windows 10 Networking BDR WiFi Robot Word Mobile Device Users Managed Service Budget Patch Management Wireless Charging Wireless Technology Audit The Internet of Things Google Docs Social Media Project Management Data Management Data Protection Application Mobile Security VPN iPhone Devices Bring Your Own Device Encryption Data Breach Productivity Google Assistant Facebook Safety Sports Cost Management Managed IT Services Travel Quick Tips Augmented Reality Excel Hosted Solution WannaCry Risk Management Commerce Password Fraud Automation Avoiding Downtime Business Technology Evernote Wi-Fi Proactive IT User Error Hacking SaaS Update Communication Gmail Shortcut Politics Artificial Intelligence Data Storage Government Save Money Cortana Touchscreen Charger Files iOS WIndows Server 2008 Scam Chromebook Co-Managed Services Data Loss Ciminal DDoS Alexa for Business Disaster Windows 10s HBO Camera Device Security Recovery Financial Payroll Humor Conferencing Data Theft Screen Mirroring Adobe Workers Computer Care Nanotechnology Samsung Management Access Control Legislation Language Printing Telephone Unified Threat Management Solid State Drive Projects Windows Ink Administrator Meetings Legal Gifts Computing Lithium-ion battery Emails Cast Vendor Licensing Reputation Updates Streaming Media Root Cause Analysis Antivirus PowerPoint Admin Comparison Outlook History Computer Fan Hyperlink Data storage Microsoft Excel IT budget Upgrades Hard Disk Drive IT Management Identity Remote Computing Google Maps Health Spyware Access Hybrid Cloud Credit Cards App store Marketing BYOD Employee-Employer Relationship Microsoft Word Chromecast Wireless Internet Saving Time Specifications Virus Wireless Value Wasting Time File Sharing Settings Telephony Emergency IT Solutions Point of Sale Data Privacy Windows 7 Apple Search Internet Exlporer Amazon Mobility Webinar Transportation Tablets Maintenance Gamification Keyboard Shortcuts Laptop Sales Proactive Software as a Service Sync Private Cloud Identity Theft Accessory Storage Social Engineering Uninterrupted Power Supply Consultant Hard Drive Display Edge Remote Monitoring Virtual Assistant FAQ IT solutions Testing Going Green NFL Social eWaste Memory Human Resources Touchpad Retail Websites Bandwidth Vendor Management Computer Forensics Peripheral Identities HaaS End of Support How To Books Education Hiring/Firing Relocation Video Games Experience Virtual Reality Work/Life Balance Personal Information Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Save Time PDF Compliance Mobile Computing Computer Accessories Thank You Battery Smart Technology Printers Flexibility Music Instant Messaging Hacker Text Messaging Regulation es Congratulations Cache Scalability Analytics Keyboard Entertainment Office tips Black Market Cleaning Training Monitors Twitter Advertising Automobile Office Big Data Managing Stress Television CrashOverride USB Worker Company Culture