Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 217-428-6449.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Network Quick Tips Personal Information Alexa for Business Patch Management Business Intelligence Value Privacy Content Filtering Congratulations Cache Tech Term IT solutions Financial Technology Mobile Device Management IT Services Phone System Wireless Technology eWaste Training Conferencing Streaming Media Gadgets Virtual Reality Hosted Solutions How To Tech Support Employer-Employee Relationship Management Proactive IT Financial Smartphone Augmented Reality Application Automation Unified Threat Management Vulnerability WPA3 Cost Management Computing Infrastructure Document Management Facebook Shadow IT Search Budget Microsoft Office Business Continuity BDR Dark Web Outlook Retail Social Media Google Cloud Computing Best Practice Automobile Emergency Managing Stress Google Drive Techology VPN Device Security Touchpad Computer Care Upgrades Wasting Money Specifications Adobe Bandwidth Internet exploMicrosoft IT Support Wireless Server Nanotechnology Humor Spyware Commerce Scalability Email Loyalty Hacking Politics Data Recovery Mobile Business Management Black Market Printing Microsoft Excel Office 365 File Storage Data Protection Hard Disk Drive Update Save Money Monitor Relocation Thank You Cleaning Wireless Internet Laptop NFL Outsourced IT Best Practices Microsoft Word Downtime Legislation Identities Safety Managed Service Provider Innovation Phishing Scam Public Computer Hosted Solution Credit Cards Identity Theft Recovery Security FAQ Encryption Windows 10s Electronic Medical Records Memory Computer Accessories Edge Hackers Work/Life Balance Screen Mirroring Data Loss Emails Internet Business Owner Network Security Applications hacker Reputation Sync Unified Communications Smartphones Malware IT Solutions Data Breach Law Enforcement Disaster Recovery Wireless Charging Mobile Devices Managed IT Services Content Filter Rootkit Files Comparison PowerPoint Monitors Business Computing Cybersecurity Computer Fan Data Privacy Troubleshooting Marketing Health SaaS Cortana Evernote Managed IT Redundancy File Sharing HBO Workers Telephone Systems Transportation Government Solid State Drive Mobility Communications Vendor Management Managed IT Service Ransomware Compliance Office Tips Browser intranet IT Support Upgrade Windows Cloud App store Hard Drives Money How to Websites History Chromecast Robot Licensing Gamification Excel Office Sales Business Technology Smart Technology Updates Students Physical Security Administration WIndows Server 2008 Cast Operating System Flexibility Books Internet Exlporer WannaCry Spam Computer Legal Monitoring Productivity Data Theft Twitter Miscellaneous Virtual Assistant Mobile Device Alert Word Professional Services Risk Management Connectivity PDF OneNote Tip of the Week iOS Data Storage BYOD Lifestyle Advertising Saving Money Touchscreen Windows 10 Mobile Security Information Data Smart Tech Remote Computing Google Assistant Computing Remote Monitoring Windows 10 Hardware Virus Save Time Chromebook Worker Apple Consultant Two-factor Authentication Customer Analysis Efficiency Maintenance Public Cloud Windows Ink Instant Messaging Hard Drive Battery Big Data Shortcut Employer Employee Relationship Managed IT Services End of Support Avoiding Downtime Television Firewall Colocation Apps Data Management Hybrid Cloud Root Cause Analysis Productivity App Holiday IoT Software as a Service Microsoft Proactive USB Internet of Things Language Software Benefits Password VoIP Router CrashOverride Google Docs Information Technology HaaS Chrome Education Entertainment Identity Fraud Computers Storage Passwords Users Bluetooth iPhone Ciminal Unsupported Software Virtualization Blockchain User Tips Computer Forensics Webinar Workplace Tips Technology Assessment MSP Company Culture Worker Commute WiFi IT budget Experience Data Backup Cybercrime Collaboration Wi-Fi Meetings Two Factor Authentication Project Management Gifts Social Engineering Backup Content Video Games Charger Communication Keyboard Devices Android The Internet of Things Artificial Intelligence Small Business Gmail User Error Samsung Data Security Tablets Private Cloud Business Settings Networking Amazon Antivirus Hiring/Firing Data storage Audit Going Green Regulation Sports Spam Blocking IT Management Travel Bring Your Own Device HIPAA Audiobook Google Maps