facebook linkedin twitter

Technology Basics: Username

Technology Basics: Username

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, we’ll take a look at this credential.

What is a Username?
A username can basically be considered an extension of your identity for your online accounts. It’s something that you use to differentiate yourself from other users of various programs and services. When you signed up for an instant messaging username back when those were popular, you created something that you could use to show others on the Internet who you were and what you were about.

This is mostly on a personal level, however. There is a more business and security-oriented side of the coin, too. The same principle of identification is present here, but it’s made for more of an authentication purpose. Are you who you really say you are? A username is half of the security credentials used for online accounts.

What Are They Used For?
Usernames are primarily used for identification and authentication, whereas passwords are meant to provide a more secure means of accessing the accounts tied to the specified username. A username is generally used to log into a specific account, although some sites might simply use your email address. They are the standard credential used by just about any online account.

Building a Strong Username
It’s not as important to have a strong username as it is to have a strong password, but it can still make things more difficult for hackers and identity thieves if your username is something obscure, at best. Generally speaking, usernames are either created by the user themselves or generated automatically by the email address they are tied to. If you have the option of making your own username, you can make them something that you will easily remember, but something that’s not necessarily easy to guess by others. If you’re talking about a username on your local network, it’s likely that your organization has a policy regarding usernames that makes them nice and easy to both identify and implement. For financial accounts where your username doesn’t need to represent you, and it’s better to have a little more anonymity, you should try to use something that doesn’t immediately identify you.

In cases like this, we want to remind you of the importance of having a strong password. Often times, the username will be easy to guess, making the password that much more important. Computerware can help your organization augment its network security and implement security best practices. To learn more, reach out to us at (703) 821-8200.

Your Backup System Provides an Immediate ROI
Seamless Access and Its Role in Your Business’ Pro...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Innovation Disaster Recovery Android Microsoft Office Mobile Office Virtualization Network Social Media Mobile Device Management Server VoIP Collaboration Communication Smartphone Miscellaneous Ransomware Upgrade Windows 10 Data Backup Unified Threat Management Windows Data Recovery Operating System Tech Term Remote Monitoring Passwords IT Support Productivity BYOD Holiday Remote Computing Vendor Management Mobile Computing Managed IT services WiFi communications Cybersecurity Apps Facebook BDR The Internet of Things Marketing Analytics Apple Automation Firewall Users History Alert Data Management Phishing Outsourced IT Mobile Device Internet of Things Managed IT Services Artificial Intelligence App IT Consultant Big data Browser Save Money Encryption Health Office Content Filtering Going Green Spam Gmail Bandwidth Bring Your Own Device Maintenance Antivirus Cost Management Office 365 Lithium-ion Battery Best Practice Information Technology Budget Two-factor Authentication Outlook Windows 8 Hiring/Firing Help Desk Hard Drives Wireless Technology Cybercrime Managed IT Printer Tech Support Virus Search VPN Travel Hacking Update Phone System Training IBM Business Technology Money Document Management Recovery Cloud Computing Employer-Employee Relationship Saving Time Computers Windows 10 Intranet Education Networking Legal Risk Management Regulations Access Control Hard Drive Customer Service SaaS Save Time It Management Government Law Enforcement Website Proactive IT Humor Compliance Running Cable Data storage Administration Password Cortana Laptop Project Management Twitter Machine Learning Business Growth Avoiding Downtime Hacker Telephone Systems iPhone Current Events Applications User Paperless Office Excel Sports Business Intelligence File Sharing Disaster Digital Payment Computing Customer Relationship Management End of Support Data Security Downtime Wireless Hosted Solution Fax Server Robot Augmented Reality DDoS Mobility Securty Patch Management Blockchain Comparison Tablet Social Engineering PowerPoint Data Loss Company Culture Computer Repair Solid State Drive Word Social Networking Information Black Market Flexibility Data Breach Vendor Vulnerabilities Value Network Congestion Cryptocurrency Healthcare Google Docs Telephony Digital Experience Websites Taxes Inbound Marketing Distributed Denial of Service Monitors Start Menu Tech Terms Streaming Media Processors Cleaning USB Office Tips Mobile Technology Public Cloud Software as a Service Pain Points Presentation Net Neutrality User Error YouTube Uninterrupted Power Supply Co-managed IT Chrome Identity Theft Virtual Desktop Managed Service Specifications Safety Unified Communications Settings Conferencing Social Bitcoin Data Protection Router Documents Google Maps Computer Accessories Virtual Reality Heating/Cooling Lifestyle Entertainment Politics Monitoring Automobile Gaming Console Storage Emails IT service Trending Chromebook Mouse Webcam Computing Infrastructure Hack Scam Text Messaging Management How To Redundancy Retail Bluetooth Statistics Download Programming eWaste Private Cloud Thin CLient Network Management Wi-Fi Shortcut Get More Done Administrator Deep Learning Knowledge Point of Contact 3D Ebay Equifax Fleet Tracking Books Workers Work/Life Balance Consultation Evernote Smart Phones Entrepreneur Turn Key Virtual Assistant Device security MSP Troubleshooting Printer Server Visible Light Communication Supercomputer Memory Technology Tips Environment Worker Fake News Browsers Desktop Finance HIPAA Microchip Trojan IT consulting Audit Nanotechnology Social Network Data Warehousing Recycling User Tip Leadership Business Cards Service Level Agreement Competition Analytic Adminstration Pirating Information Startup Asset Tracking Electronic Payment Reading Organize Samsung Unified Threat Management Backup and Disaster Recovery CIO G Suite Emergency Hard Drive Disposal Product Reviews Username Business Owner Advertising Employer Employee Relationship Flash Access Screen Reader Customer Resource management Staffing Google Wallet Licensing Microsoft Excel Data Analysis Gamification Hacks IP Address Windows XP Physical Security Computer Care Read Google Drive Windows Server 2008 Piracy Upload Banking Application Botnet Displays Smart Tech Distribution Relocation Human Resources Society Tablets Device Management Fiber-Optic Database Sync Micrsooft Vulnerability HTML Webinar Spyware Mobile Payment Telephone System Drones Business Managemenet Upselling Mobile Security Notifications CCTV Electricity Printing Content Management Windows 7 Proxy Server Software License Trends Digital Signature Business Metrics Computer Malfunction Video Surveillance Multi-Factor Security Cost Reliable Computing online Currency Electronic Medical Records Saving ZTime Fraud Tactics Teamwork In Internet of Things Devices Permissions Language cache Television UTM Content WannaCry Downloads Time Management Freedom of Information LinkedIn Dark Web Harddrive IT Plan Enterprise Resource Planning Best Practives switches Motion Sickness Writing Corporate Profile Debate Legislation Error PDF Scalability Music Health IT email scam Addiction Best Available Keyboard Upgrades GPS Accountants A.I. Messenger Tracking Assessment SharePoint External Harddrive Microserver Tip of the week Skype Multi-factor Authentication Rental Service Domains LiFi Meetings Google Calendar Archive Cabling Touchscreen News Bookmark Migration Connected Devices Public Speaking Web Server VoIP Wireless Headphones Telephone 3D Printing Capital Productuvuty Printers Fileless Malware Managing Stress Regulation CrashOverride

toner1