facebook linkedin twitter

Technology Basics: Username

Technology Basics: Username

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, we’ll take a look at this credential.

What is a Username?
A username can basically be considered an extension of your identity for your online accounts. It’s something that you use to differentiate yourself from other users of various programs and services. When you signed up for an instant messaging username back when those were popular, you created something that you could use to show others on the Internet who you were and what you were about.

This is mostly on a personal level, however. There is a more business and security-oriented side of the coin, too. The same principle of identification is present here, but it’s made for more of an authentication purpose. Are you who you really say you are? A username is half of the security credentials used for online accounts.

What Are They Used For?
Usernames are primarily used for identification and authentication, whereas passwords are meant to provide a more secure means of accessing the accounts tied to the specified username. A username is generally used to log into a specific account, although some sites might simply use your email address. They are the standard credential used by just about any online account.

Building a Strong Username
It’s not as important to have a strong username as it is to have a strong password, but it can still make things more difficult for hackers and identity thieves if your username is something obscure, at best. Generally speaking, usernames are either created by the user themselves or generated automatically by the email address they are tied to. If you have the option of making your own username, you can make them something that you will easily remember, but something that’s not necessarily easy to guess by others. If you’re talking about a username on your local network, it’s likely that your organization has a policy regarding usernames that makes them nice and easy to both identify and implement. For financial accounts where your username doesn’t need to represent you, and it’s better to have a little more anonymity, you should try to use something that doesn’t immediately identify you.

In cases like this, we want to remind you of the importance of having a strong password. Often times, the username will be easy to guess, making the password that much more important. Computerware can help your organization augment its network security and implement security best practices. To learn more, reach out to us at (703) 821-8200.

Your Backup System Provides an Immediate ROI
Seamless Access and Its Role in Your Business’ Pro...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Business Management Hackers Microsoft Workplace Tips Data Backup Managed Service Provider Productivity Hardware Business Saving Money Email Malware IT Services Network Security Efficiency IT Support Hosted Solutions Google Small Business Computer User Tips Smartphones Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Server VoIP Mobile Device Management Collaboration Data Backup Miscellaneous Smartphone Communication Upgrade Data Recovery Ransomware Windows 10 Tech Term Productivity Unified Threat Management IT Support Windows Remote Monitoring Operating System Passwords Holiday Mobile Computing BYOD Remote Computing Vendor Management Cybersecurity Managed IT services Facebook WiFi BDR communications Apps Marketing Analytics Automation Users The Internet of Things Mobile Device Phishing History Outsourced IT Apple Firewall Managed IT Services Alert Browser Internet of Things Save Money Data Management Artificial Intelligence Big data App IT Consultant Encryption Bring Your Own Device Office Gmail Maintenance Antivirus Printer Health Bandwidth Spam Content Filtering Going Green Windows 8 Saving Time Outlook Budget Cloud Computing Help Desk Two-factor Authentication Wireless Technology Business Technology Tech Support Search Virus Cybercrime Managed IT Cost Management Hiring/Firing Best Practice Information Technology Lithium-ion Battery Hard Drives Office 365 Computers VPN Travel Update Blockchain Recovery Employer-Employee Relationship Training Phone System Money Document Management Hacking IBM Managed Service Networking Access Control Legal Intranet Regulations Education Customer Service Humor It Management Administration Risk Management Government SaaS Website Information Save Time Law Enforcement Windows 10 Compliance Data storage Hard Drive Applications Running Cable Proactive IT Social Engineering Customer Relationship Management Business Growth Fax Server User Augmented Reality PowerPoint Twitter Wireless Data Security Paperless Office Sports DDoS Computing Disaster Patch Management End of Support Data Loss Hosted Solution Machine Learning Telephone Systems Business Intelligence Robot Digital Payment Word Avoiding Downtime Securty Data Breach Downtime Healthcare iPhone Value Solid State Drive Password Cortana Project Management Current Events Comparison Tablet File Sharing Digital Flexibility Company Culture Hacker Black Market Websites Excel Computer Repair Cryptocurrency Google Maps Social Networking Mobility Laptop Statistics Emails Programming Presentation Experience Automobile Software as a Service Monitors Chromebook Uninterrupted Power Supply Lifestyle Network Congestion Cleaning Conferencing Computing Infrastructure Hack Virtual Desktop Gaming Console Specifications Safety Office Tips Social How To Bitcoin Documents YouTube Vendor Download Data Protection Webcam Streaming Media Private Cloud Monitoring Text Messaging Heating/Cooling Unified Communications Settings Entertainment Telephony Storage Net Neutrality Microchip Taxes Management Distributed Denial of Service Scam Chrome Redundancy Inbound Marketing IT service Retail Vulnerabilities eWaste Router Public Cloud Evernote Computer Accessories Bluetooth Pain Points Identity Theft Trending User Error Co-managed IT Start Menu Tech Terms Mouse Processors USB Politics Mobile Technology Google Docs Virtual Reality Video Surveillance IT consulting Dark Web HTML Computer Care IP Address Fiber-Optic Database Microsoft Excel Human Resources Health IT Motion Sickness Mobile Security Saving ZTime Point of Contact Application Scalability Telephone System Google Drive Windows Server 2008 Software License Trends Vulnerability Advertising Flash Managed IT Service Messenger Tracking Multi-Factor Security Cost Spyware Mobile Payment CIO Debate Windows XP Bookmark Rental Service Meetings Devices Electricity Printing Best Practives Harddrive Staffing Google Wallet Fraud Tactics Displays Web Server UTM Content Analytic Digital Signature Society Cabling Windows 7 GPS Recycling Wi-Fi Administrator IT Plan Enterprise Resource Planning Microserver External Harddrive Product Reviews Teamwork Processor Books Workers Legislation Error cache Television Micrsooft Browsers Supercomputer Accountants A.I. WannaCry Downloads Read Drones email scam Addiction Ebay PDF User Tip Multi-factor Authentication Corporate Profile Get More Done Thin CLient Worker Time Management Freedom of Information 3D Migration Connected Devices Turn Key Smart Phones Best Available Keyboard Permissions Language Navigation Reading Samsung Wireless Headphones Telephone Assessment SharePoint Printer Server Device Management Tip of the week Business Managemenet Data Analysis Employer Employee Relationship Equifax Fleet Tracking Google Calendar Trojan Content Management Domains G Suite Network Management Adminstration Pirating Information switches Writing Hacks Physical Security Device security MSP VoIP Leadership Public Speaking Music Licensing Touchscreen News Organize Banking Botnet Desktop Finance Knowledge Shortcut Tech Relocation Tablets Nanotechnology Social Network Consultation online Currency Upgrades Service Level Agreement Virtual Assistant Entrepreneur LiFi Fileless Malware Startup Asset Tracking Technology Tips Troubleshooting Sync Business Cards LinkedIn Environment Proxy Server Notifications CCTV Username Audit HIPAA Unified Threat Management Backup and Disaster Recovery Fake News Deep Learning Electronic Medical Records Business Metrics Computer Malfunction Gamification Competition Work/Life Balance Term Reliable Computing Screen Reader Customer Resource management Data Warehousing Webinar Electronic Payment In Internet of Things Piracy Upload Emergency Hard Drive Disposal Skype Visible Light Communication Memory Directions Smart Tech Distribution Access Upselling Archive Business Owner 3D Printing Productuvuty Managing Stress Processing Regulation CrashOverride Printers Capital

toner1