fbpx
Mytek Logo
MyTek Logo

Technical Support – Small Business Security: Username

by | Jul 25, 2018 | Best Practices, MyTek Blog

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

According to a 2018 Verizon report, 58% of malware attack victims were categorized as small businesses. Because of these findings, if you’re a small business in Phoenix, security should be at the top of your list. 

Did you know that, according to a 2018 Verizon report,  58% of malware attack victims are categorized as small businesses?  It’s true – so online security should be a top priority for Phoenix small business security. Our MyTek tech support tip today is about the security and purpose of usernames. When you sign up for anything online, you are often prompted to create a username and password. Here are some best username security practices about how usernames work and how to get them to work for your benefit.

Technical Support Tips for Ease of Use

A username can be the name that is given to a user, a computer, or a network and is usually also an abbreviation of the network, computer, or user’s name. One example would be if the user’s name is Brett Hanson, a username for this person could be hansbr. This is for identification purposes within your database that hold information.

A username can also be your email if that is what a website uses for you to log in. It can also be a display name for people to use to find you a service, like Venmo or another popular payment app that uses usernames to send others you know money. In this situation, you’ll want to make your username easy to share and easy to remember.

Small Business Software User Name and Password Strategies

If you are using a username for something that relates to security, you may want to choose a username that is less identifiable and more unique so that hackers can be deterred. This applies to usernames for networks, or even online banking account usernames, which should never be easily guessable.

When a strong username is combined with a unique and strong password, their security can be unmatched and make it harder for threats to get into your accounts.

Technical Support Recommendations for Username Best Practices

Since the username and passwords are both very important key elements to getting into your account, here are some best practices you should follow:

  • Pick a username you can remember – Most websites have a password reset tool but not many have reset tools for usernames, so it is important to keep it simple, keep it saved and keep it remembered.
  • Never use personal information – Never use sensitive information like your date of birth, social security information, contact information like your phone number, or anything else you wouldn’t want to give out to a stranger. This type of information can make hacking extremely easy for big threats.
  • Take into account the platform you are signing into – Before you decide on a username, think about the type of website you are signing up for. Is this a website in which people will need to easily find you? Is this something that should be high security and a unique username would be best? 

Usernames are used for business and personal life, so the better you understand their importance, the safer you will be. MyTek often shares new tips on our blog, so come back and read more soon or give us a call today at 623-312-2440 for more information on username security.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This