fbpx

Technical Support – Small Business Security: Username

by | Jul 25, 2018 | Best Practices, MyTek Blog

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Did you know that, according to a 2018 Verizon report,  58% of malware attack victims are categorized as small businesses?  It’s true – so online security should be a top priority for Phoenix small business security.

Today, MyTek technical support tip is about the purpose and security of a username. It all starts simply.  For example, when you sign up for any service online, you will be asked to create a username and a password. Our technical support team will provide you with some security best practices on how to create a username that works to your benefit.

Technical Support Tips for Ease of Use

The username is the name given to a user (or in some cases the computer or network) and is typically some abbreviation of the user’s, computer’s, or network’s name. An example would be if a user’s name is Brett Hanson, a strong username would be hansbr. It is strictly for identification purposes in the database that holds access information.

In some cases, a username might also simply be your email that you use to sign up for a service, or it may also be a display name for people to find you on a service. For example, the popular payment app Venmo uses the username as a way to send someone cash. Making your username easy to remember and share may be a benefit.

Small Business Software User Name and Password Strategies

Other times, and particular with your small business software, you may want to make your username something more unique and less identifiable for security reasons to help deter hackers. And of course, security around financials should be paid close attention to, including online banking account usernames, which shouldn’t be guessable.

Combined with strong, unique passwords, unique usernames can add one small extra security step to make it slightly harder to get into your accounts.

Technical Support Recommendations for Username Best Practices
Coupled with your password, your username is important as it is essential for access. Since it’s the key to a user’s identity when trying to access data and applications, it is important to follow some best practices. These include:

  1. Pick a username you can remember – Most services have a password retrieval or reset tool attached, but not many have a tool that allows you to retrieve your identifier. Keep it simple.
  2. Never use personal information – Information like your social security number should never be used as a username or password. Your social security number is a coveted piece of information that, if attained, can cause you a lot of personal grief. Other sensitive information to avoid would be your date of birth, any contact information, or anything else you wouldn’t want a total stranger to have.
  3. Take into account the platform you are signing into – If you want an account to stay anonymous, for example, ensure that your username is something obscure or is set to not show.

Both in business and personal life, we use usernames every day, so the more you are cognizant of how to best utilize them to your advantage, the better. Be particularly careful with your business software and online financial access. You can find out more about Phoenix IT security HERE. For more great technology support information contact us today at 623-312-2440.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Will We Soon Leave Passwords Behind?

If I were to tell you that one variable was responsible for more than 80 percent of cyberattacks, what would you guess that variable was? If you guessed “stolen access credentials,” you’d be correct. The traditional username/password combination may soon be a thing of...

Are Breaks During the Workday all that Helpful?

Modern society is greatly focused on the virtue of hard work, of productivity. This has led to a kind of unspoken prejudice against breaks in the workplace, that any break that is not earned is the sign of an unproductive employee. As it turns out, the opposite is...

MyTek Invited to Join Phoenix Business Journal Leadership Trust

Phoenix Business Journal Leadership Trust is an Invitation-Only Community for Top Business Decision Makers in Greater Phoenix SCOTTSDALE, Ariz., August 26, 2020 — Tim Tiller, CEO of MyTek, an Arizona-based managed IT services firm with an industry-disruptive...

Mobile? Grab this Article!

QR Code

Blog Archive

Share This