facebook linkedin twitter

Technology Basics: Username

Technology Basics: Username

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, we’ll take a look at this credential.

What is a Username?
A username can basically be considered an extension of your identity for your online accounts. It’s something that you use to differentiate yourself from other users of various programs and services. When you signed up for an instant messaging username back when those were popular, you created something that you could use to show others on the Internet who you were and what you were about.

This is mostly on a personal level, however. There is a more business and security-oriented side of the coin, too. The same principle of identification is present here, but it’s made for more of an authentication purpose. Are you who you really say you are? A username is half of the security credentials used for online accounts.

What Are They Used For?
Usernames are primarily used for identification and authentication, whereas passwords are meant to provide a more secure means of accessing the accounts tied to the specified username. A username is generally used to log into a specific account, although some sites might simply use your email address. They are the standard credential used by just about any online account.

Building a Strong Username
It’s not as important to have a strong username as it is to have a strong password, but it can still make things more difficult for hackers and identity thieves if your username is something obscure, at best. Generally speaking, usernames are either created by the user themselves or generated automatically by the email address they are tied to. If you have the option of making your own username, you can make them something that you will easily remember, but something that’s not necessarily easy to guess by others. If you’re talking about a username on your local network, it’s likely that your organization has a policy regarding usernames that makes them nice and easy to both identify and implement. For financial accounts where your username doesn’t need to represent you, and it’s better to have a little more anonymity, you should try to use something that doesn’t immediately identify you.

In cases like this, we want to remind you of the importance of having a strong password. Often times, the username will be easy to guess, making the password that much more important. Computerware can help your organization augment its network security and implement security best practices. To learn more, reach out to us at (703) 821-8200.

Your Backup System Provides an Immediate ROI
Seamless Access and Its Role in Your Business’ Pro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips Mobile Devices Innovation User Tips Gadgets Business Continuity Disaster Recovery VoIP Microsoft Office Network Social Media Android Virtualization Collaboration Data Backup Mobile Office Productivity Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Tech Term Upgrade Ransomware Windows 10 communications IT Support Unified Threat Management Windows Facebook Holiday Operating System Remote Monitoring Passwords Cybersecurity BYOD Managed IT services Remote Computing Vendor Management Mobile Computing Apps Automation Users WiFi BDR Phishing Analytics Mobile Device The Internet of Things Marketing Outsourced IT History Apple Data Management Firewall Internet of Things Managed IT Services Browser Alert Artificial Intelligence Save Money App Encryption IT Consultant Big data Bring Your Own Device Bandwidth Maintenance Gmail Antivirus Printer Cloud Computing Office Health Content Filtering Going Green Office 365 Spam Hard Drives Two-factor Authentication Help Desk Wireless Technology Business Technology Saving Time Search Managed IT Virus Tech Support Cybercrime Windows 10 Cost Management Best Practice Information Technology Lithium-ion Battery Outlook Windows 8 Hiring/Firing Budget Computers Blockchain VPN Travel Recovery Employer-Employee Relationship Update Phone System Hacking IBM Healthcare Money Training Document Management Access Control PowerPoint Customer Service Proactive IT Running Cable It Management Humor Hard Drive Law Enforcement Applications Administration Mobility Website Government Compliance Managed Service Intranet Data storage Twitter Education Risk Management Legal Networking Information Regulations Save Time SaaS Augmented Reality Hosted Solution End of Support Company Culture Social Robot Computer Repair File Sharing Wireless Data Security Securty Social Networking Google Maps DDoS Patch Management Solid State Drive Data Loss Social Engineering Scam Black Market Flexibility Cryptocurrency Word Avoiding Downtime Data Breach Laptop Password Cortana iPhone Business Growth Value Project Management Digital Current Events Websites Business Intelligence Hacker Machine Learning Excel Digital Payment Paperless Office Telephone Systems Router Downtime Customer Relationship Management Sports Computing Fax Server Disaster Comparison Tablet User Specifications Safety Trending Virtual Desktop Gaming Console Bitcoin Mouse Identity Theft IT service Documents Webcam Data Protection Text Messaging Programming Entertainment Statistics Heating/Cooling Storage Virtual Reality Network Congestion Politics Bluetooth Conferencing Automobile Emails Chromebook Retail Inbound Marketing Redundancy Computing Infrastructure Hack Streaming Media Monitoring How To eWaste Google Docs Private Cloud Experience Download Evernote Cleaning Net Neutrality Pain Points Monitors Chrome User Error Management Office Tips Co-managed IT Telephony Processors Start Menu Tech Terms Microchip Taxes Vulnerabilities Distributed Denial of Service USB Mobile Technology YouTube Cooperation Software as a Service Unified Communications Settings Computer Accessories Presentation Lifestyle Public Cloud Vendor Uninterrupted Power Supply Startup Asset Tracking Relocation Tablets Vulnerability LinkedIn Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Medical IT Debate Permissions Language Unified Threat Management Best Practives Backup and Disaster Recovery Sync Harddrive Browsers Electricity Printing Username Windows 7 Archive Screen Reader Customer Resource management User Tip Skype Gamification Notifications CCTV Digital Signature GPS Security Cameras Smart Tech Microserver Distribution Reliable Computing External Harddrive Music Piracy Upload Business Metrics Computer Malfunction Teamwork Navigation cache Television switches Writing Professional Services Fiber-Optic Database In Internet of Things Data Analysis WannaCry Downloads Upgrades Point of Contact HTML Time Management Freedom of Information LiFi Get More Done Telephone System PDF Thin CLient Corporate Profile Mobile Security 3D GDPR Ebay Multi-Factor Security Turn Key Cost Scalability Smart Phones Software License Printer Server Trends Motion Sickness Best Available Keyboard Tech Assessment SharePoint Messenger Tracking Domains Voice over Internet Protocol Tip of the week Work/Life Balance Recycling Fraud Trojan Tactics Fileless Malware Google Calendar Deep Learning Analytic Devices Modem Pirating Information Touchscreen News Visible Light Communication Memory Proxy Server Leadership VoIP Product Reviews UTM Organize Content Rental Service Meetings Public Speaking Adminstration Read Legislation Error Cabling Electronic Medical Records Knowledge IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation IT consulting A.I. Books Workers Troubleshooting Recording Virtual Assistant email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Accountants SSID Fake News Advertising Flash Device Management Environment Dark Web Audit CIO Multi-factor Authentication Supercomputer HIPAA Windows XP Content Management Wireless Headphones Telephone Worker Electronic Payment Health IT Staffing Google Wallet Business Managemenet Migration Webinar Connected Devices Competition Processing Data Warehousing Equifax Fleet Tracking Reading Samsung Business Owner Emergency Hard Drive Disposal Society Network Management Upselling Managed IT Service Access Displays IP Address Video Surveillance Microsoft Excel online Currency G Suite Bookmark Computer Care Micrsooft Device security MSP Employer Employee Relationship Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Saving ZTime Drones Desktop Finance Hacks Physical Security Application Google Play Google Drive Printers Managing Stress CrashOverride Regulation 3D Printing Capital Productuvuty