Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 217-428-6449.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Proactive Entertainment Computing Mobile Innovation Comparison Mobility Quick Tips Monitors Employer-Employee Relationship Professional Services Software IoT Data Managed Service Gadgets Budget Server Consultant Thank You File Storage IT Services FAQ Blockchain Projects Data Backup Devices IT budget Automation Shadow IT Computer Forensics Training Monitor Value Cloud Computing Wasting Money Gmail Wasting Time Data Protection Smart Technology Employer Employee Relationship Windows Managed IT Reputation Artificial Intelligence Cybercrime PDF Unified Threat Management Data storage Experience Company Culture Users VoIP Sync Smartphone Management Credit Cards Bandwidth Transportation Managed IT Services Augmented Reality Nanotechnology Students Windows Ink Video Games App store Tech Support PowerPoint Information Personal Information VPN Remote Computing Router Monitoring Maintenance Chromebook Passwords Electronic Medical Records Hosted Solution Ciminal Vendor OneNote Audit Public Computer Law Enforcement Two Factor Authentication Antivirus IT solutions Touchscreen Identity Theft Security Language Telephone Systems Data Privacy Device Security intranet Communications Screen Mirroring Software as a Service Alert Charger Patch Management Retail Storage Applications Cast IT Support Hard Disk Drive Flexibility Data Management Access Control Hackers Hardware Saving Time Network Security iOS Analysis Benefits WIndows Server 2008 Wireless Internet Hosted Solutions Cleaning SMB Microsoft BDR Unsupported Software Administration Cache Wireless Technology Avoiding Downtime Data Recovery Phone System Microsoft Office Business Owner Streaming Media End of Support Office Tips History Alexa for Business Shortcut Keyboard Word Virtual Assistant Samsung Microsoft Word Virus Computer Unified Communications Hard Drive eWaste The Internet of Things Save Time Chrome Risk Management Human Resources Networking User Tips Wi-Fi Virtualization Downtime Privacy Document Management Outsourced IT Spam Blocking Malware Troubleshooting HBO Utility Computing Managing Stress Sales Productivity Redundancy Smart Tech Office 365 Best Practices Network Edge Proactive IT Audiobook Firewall Data Theft Display MSP Internet Exlporer Marketing Holiday Compliance Google Maps Internet exploMicrosoft Relocation CrashOverride Windows 7 Recovery Project Management Business Intelligence Techology IT Service Peripheral Legislation Business Technology Physical Security Wireless Charging Connectivity Content Filter WiFi Big Data Keyboard Shortcuts Customer Mobile Security Gifts Hybrid Cloud Tip of the Week Memory Work/Life Balance Internet of Things Emergency Television Assessment Camera WPA3 Specifications Excel Licensing Two-factor Authentication Data Loss Communication Spam Operating System Email Update Identities Collaboration Remote Workers Android Emails Root Cause Analysis Laptop Business Management Financial Technology Worker Commute IT Management Vulnerability Black Market Disaster Recovery Mobile Device Miscellaneous Technology Backup Printers Managed IT Services Bring Your Own Device Education Search Efficiency Accessory Automobile Ransomware Hyperlink Private Cloud Health iPhone Upgrade Encryption BYOD Cortana Advertising Vendor Management Cloud Internet Going Green Humor Printing Telephone Windows 10 Business Computing Cost Management Content Computer Care Touchpad Co-Managed Services Workers User Error Bluetooth Workplace Tips WannaCry Phishing Browser Hacking USB Admin Data Storage Microsoft Excel Payroll Outlook Battery Google Docs NFL Colocation Safety Google Loyalty Social Engineering Wireless Data Security How To IT Support Windows 10s Apps HIPAA Application Robot Scam Office Hiring/Firing Social Media How to Solid State Drive Computers Scalability Settings Smartphones Public Cloud Instant Messaging Saving Money Computer Accessories Mobile Devices Data Breach Sports Tablets Gamification Business Tech Term Financial Chromecast Money Content Filtering Facebook File Sharing Conferencing Google Drive Updates Upgrades SaaS Worker Managed IT Service Computer Fan Apple Remote Monitoring Travel Mobile Device Management Windows 10 HaaS Twitter Managed Service Provider Dark Web App Spyware Fraud Websites Information Technology Regulation Commerce Testing Virtual Reality Politics Employee-Employer Relationship Business Continuity Cybersecurity Computing Infrastructure Amazon Congratulations Identity Webinar Meetings Password Save Money Legal Evernote Google Assistant Government Small Business Lifestyle Productivity IT Solutions hacker Adobe Hard Drives Rootkit Books Best Practice Files