Technology Basics: Username

Technology Basics: Username

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, we’ll take a look at this credential.

What is a Username?
A username can basically be considered an extension of your identity for your online accounts. It’s something that you use to differentiate yourself from other users of various programs and services. When you signed up for an instant messaging username back when those were popular, you created something that you could use to show others on the Internet who you were and what you were about.

This is mostly on a personal level, however. There is a more business and security-oriented side of the coin, too. The same principle of identification is present here, but it’s made for more of an authentication purpose. Are you who you really say you are? A username is half of the security credentials used for online accounts.

What Are They Used For?
Usernames are primarily used for identification and authentication, whereas passwords are meant to provide a more secure means of accessing the accounts tied to the specified username. A username is generally used to log into a specific account, although some sites might simply use your email address. They are the standard credential used by just about any online account.

Building a Strong Username
It’s not as important to have a strong username as it is to have a strong password, but it can still make things more difficult for hackers and identity thieves if your username is something obscure, at best. Generally speaking, usernames are either created by the user themselves or generated automatically by the email address they are tied to. If you have the option of making your own username, you can make them something that you will easily remember, but something that’s not necessarily easy to guess by others. If you’re talking about a username on your local network, it’s likely that your organization has a policy regarding usernames that makes them nice and easy to both identify and implement. For financial accounts where your username doesn’t need to represent you, and it’s better to have a little more anonymity, you should try to use something that doesn’t immediately identify you.

In cases like this, we want to remind you of the importance of having a strong password. Often times, the username will be easy to guess, making the password that much more important. Computerware can help your organization augment its network security and implement security best practices. To learn more, reach out to us at (703) 821-8200.

Your Backup System Provides an Immediate ROI
Seamless Access and Its Role in Your Business’ Pro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Services IT Support Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets User Tips Quick Tips Business Continuity Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Innovation Mobile Device Management Server VoIP Social Media Smartphone Miscellaneous Upgrade Ransomware Windows 10 Unified Threat Management Windows Collaboration Communication Remote Monitoring Operating System Remote Computing Passwords Managed IT services Data Recovery Holiday Data Backup Mobile Computing BYOD Apps Facebook Cybersecurity IT Support WiFi Vendor Management Tech Term The Internet of Things Marketing communications Firewall Automation BDR Apple Users Analytics History Productivity Alert Internet of Things Data Management App Mobile Device Save Money Outsourced IT Artificial Intelligence Managed IT Services IT Consultant Phishing Spam Content Filtering Gmail Going Green Maintenance Bring Your Own Device Office Health Bandwidth Big data Budget Encryption Windows 8 Outlook Best Practice Information Technology Hiring/Firing Lithium-ion Battery Hard Drives Browser Cybercrime Printer Tech Support Virus Wireless Technology Cost Management Antivirus Search Managed IT Two-factor Authentication Money Document Management IBM Recovery Employer-Employee Relationship Computers Help Desk Travel Hacking Update Office 365 Phone System Data storage Access Control Save Time Customer Service It Management Website Networking Government Legal Business Technology Proactive IT Running Cable Regulations Humor Training Saving Time VPN Intranet SaaS Education Hard Drive Windows 10 Administration Law Enforcement Risk Management Cloud Computing Compliance Avoiding Downtime Applications User Business Intelligence Flexibility Digital Payment Black Market Downtime iPhone Laptop Wireless Data Security DDoS Fax Server Comparison Tablet Business Growth Company Culture Machine Learning Excel Telephone Systems Patch Management Blockchain Computer Repair Data Loss Customer Relationship Management Social Networking Augmented Reality Word Paperless Office PowerPoint Data Breach Password Cortana Computing Twitter File Sharing Disaster End of Support Hosted Solution Robot Project Management Hacker Mobility Securty Social Engineering Current Events Solid State Drive Inbound Marketing Co-managed IT Chrome Computing Infrastructure Hack Bluetooth Software as a Service User Error Uninterrupted Power Supply Specifications Safety How To Virtual Desktop Router Private Cloud Social Download Cryptocurrency Google Docs Documents Computer Accessories Bitcoin Pain Points Data Protection Lifestyle Heating/Cooling Telephony Experience Storage Monitors Trending Taxes Cleaning Office Tips Monitoring Mouse Distributed Denial of Service Retail Programming Public Cloud YouTube Statistics Scam Sports Management eWaste Unified Communications Settings Redundancy Gaming Console Network Congestion Identity Theft Value Text Messaging Webcam Vulnerabilities Streaming Media Google Maps Digital Healthcare Processors Virtual Reality IT service Websites Politics Start Menu Tech Terms Automobile USB Emails Mobile Technology Net Neutrality Chromebook Presentation Computer Care Screen Reader Human Resources Device Management LiFi Microsoft Excel Gamification Application Messenger Tracking Adminstration Smart Tech Pirating Information Distribution Webinar Content Management Google Drive Windows Server 2008 Piracy Leadership Upload Business Managemenet Rental Service Meetings Cabling Deep Learning Spyware Mobile Payment Fiber-Optic Database Web Server Work/Life Balance Vulnerability HTML Managed Service Electricity Printing Conferencing online Currency Wi-Fi Administrator Visible Light Communication Memory Mobile Security Digital Signature Books Workers Multi-Factor Security Cost Entertainment IT consulting Windows 7 Software License Trends Teamwork Supercomputer Worker cache Television Fraud Tactics LinkedIn Microchip Devices Samsung CIO WannaCry Downloads PDF Advertising Flash Upselling UTM Content Best Practives Reading Corporate Profile Legislation Video Surveillance Error Archive G Suite Windows XP Time Management Freedom of Information IT Plan Enterprise Resource Planning Best Available Keyboard Skype Employer Employee Relationship Staffing Google Wallet Accountants A.I. Domains Licensing Displays Assessment SharePoint email scam Saving ZTime Addiction Microserver Hacks Physical Security Society Relocation Tablets Micrsooft Google Calendar Banking Botnet Tip of the week Multi-factor Authentication Information Public Speaking Point of Contact VoIP Wireless Headphones Debate Sync Touchscreen News Harddrive Migration Connected Devices Get More Done Shortcut Drones GPS Equifax Fleet Tracking Printer Server Troubleshooting Consultation Evernote Network Management Turn Key Entrepreneur Notifications CCTV Knowledge Analytic Reliable Computing Technology Tips External Harddrive Environment Recycling Business Metrics Computer Malfunction Permissions Language Virtual Assistant Device security MSP Trojan HIPAA Audit Nanotechnology Organize Electronic Payment In Internet of Things Fake News Desktop Finance Competition Product Reviews 3D Startup Ebay Asset Tracking Business Owner Read switches Writing Data Warehousing Business Cards Thin CLient Service Level Agreement Music IP Address Scalability Upgrades Access Smart Phones Unified Threat Management Backup and Disaster Recovery Motion Sickness Emergency Hard Drive Disposal Username Productuvuty Managing Stress 3D Printing Regulation CrashOverride Capital