Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Other times, you may want to make your username something more unique and less identifiable. One such case would be in regard to your bank account username, which typically shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra step to make it slightly harder to get into your accounts.

Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember - Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information - Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into - If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

We use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. For more great technology information contact us today at 217-428-6449.

The Chrome Browser is Redefining Your Security
Three Reasons VoIP is a Great Choice for Businesse...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Excel Tech Support NFL IT Support Scalability Assessment Politics Law Enforcement Sales Robot Computer Fan Testing Flexibility Solid State Drive Data Backup Twitter Benefits Backup Streaming Media Redundancy Black Market Humor Keyboard Regulation Data Computer Care Printing Office 365 Company Culture VoIP Hackers Evernote Managing Stress Mobile Security Emails Students intranet Data Security Computer Accessories Analysis Updates Thank You Virus BDR Bring Your Own Device Blockchain Gamification PDF Best Practice Google Docs Memory Gadgets Television Financial The Internet of Things Saving Money Google Assistant Mobility Content Filtering Windows 10 Reputation Content Filter Recovery Data Loss Computer Forensics Cost Management Cloud Computing Phone System Internet of Things Data Breach Technology Public Computer Vendor Bluetooth Hosted Solution Scam Instant Messaging Business Owner Windows Ink IT solutions Social Engineering Spam Blocking IT Services Proactive IT Physical Security Cybercrime Communication Cloud Managed IT Services Wi-Fi Chromecast Loyalty Camera Video Games Employer-Employee Relationship Administration Data Theft Identity Wireless Internet Application Avoiding Downtime File Storage Files Books Dark Web Automation Google Maps Managed Service Provider Augmented Reality Managed IT Services Licensing Monitors Bandwidth Efficiency Mobile Device Telephone Systems Adobe Employer Employee Relationship Operating System Display Meetings USB Office Remote Monitoring Software Wasting Money Artificial Intelligence WannaCry Smart Technology Microsoft Office Best Practices Money Users Monitor BYOD Emergency Network Unified Threat Management App How To Business Technology Update Windows 10s Data storage Document Management Touchpad Microsoft Word Smartphones Personal Information Project Management Cortana Save Time iOS Downtime Devices Internet PowerPoint Travel Encryption Alert Employee-Employer Relationship Networking VPN Training Managed Service Smartphone Browser Ransomware Automobile Monitoring Hyperlink Wireless Charging Microsoft Excel Shadow IT Wasting Time IT Management Facebook Antivirus Professional Services History Hacking Tech Term Hard Drives Remote Computing Data Privacy FAQ Maintenance Consultant App store Windows Mobile Devices Apple Data Recovery Passwords Electronic Medical Records Cleaning hacker Education Going Green Quick Tips Router Windows 10 Compliance Internet exploMicrosoft Managed IT Unsupported Software Cache Public Cloud Co-Managed Services Business Intelligence Google Business Email Word Risk Management eWaste Outsourced IT Colocation Cast HBO Projects Comparison Specifications Value Disaster Recovery Sync Collaboration Edge Upgrade Legal Hard Drive IT Support Experience OneNote IT Solutions Applications Accessory Password Financial Technology Outlook User Error Spam Storage Apps Data Storage Screen Mirroring Business Continuity Lifestyle Gmail Firewall Proactive Transportation Samsung Workplace Tips Gifts Business Computing CrashOverride Miscellaneous Private Cloud Webinar Wireless Data Management Vendor Management Computers Computing End of Support Content Virtual Assistant Troubleshooting Workers Laptop Communications Websites Network Security Hosted Solutions Amazon HIPAA Software as a Service Computer Computing Infrastructure Techology Phishing iPhone Health Holiday User Tips Audit Virtual Reality Upgrades Legislation Wireless Technology Google Drive WPA3 Battery Microsoft Audiobook Fraud Tablets Information Technology Rootkit Relocation Hard Disk Drive Tip of the Week Alexa for Business HaaS Worker Commute Language Safety Root Cause Analysis Two Factor Authentication Information Identities File Sharing SaaS Social Media Productivity Hybrid Cloud Save Money Windows 7 Data Protection Peripheral Management Mobile Device Management Managed IT Service Settings Commerce Hardware Office Tips Mobile IoT Patch Management Security Identity Theft Spyware Chrome MSP Internet Exlporer Conferencing Smart Tech Device Security Small Business Customer Entertainment Budget Malware WiFi Charger Big Data IT budget Android Marketing Cybersecurity Government Congratulations Sports Virtualization Touchscreen Innovation Credit Cards Hiring/Firing Server WIndows Server 2008 Nanotechnology Work/Life Balance Two-factor Authentication Telephone Worker Printers Chromebook Vulnerability Business Management How to Advertising Privacy Unified Communications Productivity Search Shortcut Ciminal Retail Connectivity