fbpx
Mytek Logo
MyTek Logo

Technical Support – Small Business Security: Username

by | Jul 25, 2018 | Best Practices, MyTek Blog

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

According to a 2018 Verizon report, 58% of malware attack victims were categorized as small businesses. Because of these findings, if you’re a small business in Phoenix, security should be at the top of your list. 

Did you know that, according to a 2018 Verizon report,  58% of malware attack victims are categorized as small businesses?  It’s true – so online security should be a top priority for Phoenix small business security. Our MyTek tech support tip today is about the security and purpose of usernames. When you sign up for anything online, you are often prompted to create a username and password. Here are some best username security practices about how usernames work and how to get them to work for your benefit.

Technical Support Tips for Ease of Use

A username can be the name that is given to a user, a computer, or a network and is usually also an abbreviation of the network, computer, or user’s name. One example would be if the user’s name is Brett Hanson, a username for this person could be hansbr. This is for identification purposes within your database that hold information.

A username can also be your email if that is what a website uses for you to log in. It can also be a display name for people to use to find you a service, like Venmo or another popular payment app that uses usernames to send others you know money. In this situation, you’ll want to make your username easy to share and easy to remember.

Small Business Software User Name and Password Strategies

If you are using a username for something that relates to security, you may want to choose a username that is less identifiable and more unique so that hackers can be deterred. This applies to usernames for networks, or even online banking account usernames, which should never be easily guessable.

When a strong username is combined with a unique and strong password, their security can be unmatched and make it harder for threats to get into your accounts.

Technical Support Recommendations for Username Best Practices

Since the username and passwords are both very important key elements to getting into your account, here are some best practices you should follow:

  • Pick a username you can remember – Most websites have a password reset tool but not many have reset tools for usernames, so it is important to keep it simple, keep it saved and keep it remembered.
  • Never use personal information – Never use sensitive information like your date of birth, social security information, contact information like your phone number, or anything else you wouldn’t want to give out to a stranger. This type of information can make hacking extremely easy for big threats.
  • Take into account the platform you are signing into – Before you decide on a username, think about the type of website you are signing up for. Is this a website in which people will need to easily find you? Is this something that should be high security and a unique username would be best? 

Usernames are used for business and personal life, so the better you understand their importance, the safer you will be. MyTek often shares new tips on our blog, so come back and read more soon or give us a call today at 623-312-2440 for more information on username security.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Tip of the Week: Scaling Your Wi-Fi Network

Does your business rely on wireless internet connectivity to run? This is pretty standard and it means that your productivity levels might be tied to the quality of the internet connection you have. As your business grows and expands, you’ll need to make sure that...

What are IT Best Practices, Anyways?

We’re sure you’ve heard the term “best practices” before, and we know it can end up sounding like just another IT buzzword, especially if you’re not aware of the real meaning of it. We promise that “best practices” is an actually important term with real meaning, so...

Mobile? Grab this Article!

QR Code

Blog Archive

Share This