Our Blog: Stuff we think you should know

Tech Term: SSID

Tech Term: SSID

When you work with technology as much as we do, there’s a bit of lingo that you pick up here and there. Of course, we then have a habit of using the terminology that we’ve picked up all the time, forgetting that not everyone has the same experience that we do. One word that causes this a lot is SSID. Here, we’ll discuss what we’re referring to when we use this term.

Wireless Connections
Mobile devices are an extremely popular method of computing now, with wireless connections utilized all the time in the office, the home, and in other (less secure) places - but security issues are a topic for another blog. To do so, a user generally connects to a wireless network, identifying it by name - this name, the service set identifier, is the SSID.

Each SSID you see in the list on your device is the name of a different network in range of your device. If the person in charge of a network is doing their job right, a password will be required to access the network, the SSID is just how each can be more easily identified.

How To Change Your SSID (And Why)
There are a few reasons why you may want to change the name of your own wireless network. Primarily, it makes it more difficult for a hacker to get into it without the password, but it also makes it easier to differentiate it from others in the area.

To change your SSID, access its settings by entering your router’s IP address into your web browser and typing in the access credentials, which are usually very generic and included with the device. From there, you should be able to find the option to alter the SSID and the password. Your SSID is case-sensitive, and can use up to 32 alphanumeric characters.

Assigning Multiple SSIDs
You can also configure your router to support a few different networks by using separate SSIDs. This comes in handy if you’re trying to protect some of your business’ internal information while still trying to offer visitors to the office Internet access.

For assistance with this, or with any other IT concern, reach out to us at 866.625.3560.

500 Million Users Exposed by Marriott
Powerful Physical Security Options


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Network Security Internet Microsoft Google Software Tech Term Productivity Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Backup Windows 10 Hardware Ransomware Data Android Smartphone Productivity Saving Money IT Support Workplace Tips Browser Data Management Managed IT Services Microsoft Office Gmail Cloud Computing Business Continuity Facebook Internet of Things Server Data Recovery Upgrade Windows Managed IT Services Passwords Office 365 Data Backup Disaster Recovery Innovation Phishing App Word Mobile Device Windows 10 Artificial Intelligence Smartphones Cybersecurity Business Management Managed Service Provider Users VoIP Remote Monitoring Encryption Outsourced IT Employer-Employee Relationship Content Filtering Analytics IT Support Big Data Miscellaneous Tip of the week communications Vulnerability Government Money Spam BYOD Website Information Social Media Applications Infrastructure Office Tips Network Chrome Paperless Office Maintenance Data storage Display Bandwidth WiFi YouTube Avoiding Downtime Tablet The Internet of Things Robot Risk Management Antivirus Employee-Employer Relationship Wireless Printing Managed Service Automation Access Control Router Customer Service Save Money IT Management Apple Virtual Reality Hacker Settings Two-factor Authentication Firewall Retail Hosted Solution Quick Tips SaaS Business Intelligence Presentation Scam Outlook Monitors Office Holiday Search Education Unified Threat Management Networking Gadgets Company Culture Wireless Technology IBM Recovery Virtualization Administration VPN Operating System Mobile Device Management Data Security End of Support HIPAA Customer Relationship Management Wi-Fi Computing Data loss Business Technology Laptop Password Document Management Development Virtual Private Network Google Drive Augmented Reality Mouse Vendor Management Server Management Apps Safety Touchscreen LiFi Mobile Security Computers Hacking Downtime Telephone Systems Storage Professional Services Scary Stories Work Content Current Events Black Friday Regulations Address Hotspot Desktop User Error Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Patch Management Legal Microsoft Excel Star Wars IP Address Cybercrime Staff Shortcuts Bluetooth Drones Dark Web Nanotechnology Spying Alt Codes Dark Data Language Remote Computing USB Sports Optimization Streaming Going Green Social Engineering Cyber Monday Social Networking Undo Knowledge Analysis Corporate Profile Troubleshooting VoIP Social Google Calendar Marketing Chatbots FinTech Solid State Drive Blockchain Update Cost Management Mobile Office Printer Wearable Technology Application Security Cameras Net Neutrality Screen Reader How To Typing Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Digital Payment Experience Unified Communications WannaCry Deep Learning Humor Running Cable Time Management Hacks Legislation Identity Politics MSP Hard Disk Drive Permissions Chromebook Assessment Firefox Cryptocurrency Virtual Desktop Managing Stress Managed Services Cabling Budget FCC Smart Tech Collaboration PowerPoint Alerts Service Level Agreement Buisness eWaste Device BDR Servers How To Distributed Denial of Service Bring Your Own Device sip Lithium-ion battery LED Network Management Comparison Hard Drives Tech Support IT solutions Fraud Internet Exlporer Bitcoin Techology Network Congestion SharePoint Computer Care Cables Laptops Managed IT Title II Connectivity File Sharing Onboarding Licensing Samsung 5G Continuity Mobility Google Maps Information Technology Managed IT Service Modem Slack Digital Best Practice Lenovo telephony Halloween Smart Office Co-Managed IT Writing Specifications Compliance Refrigeration Websites Identity Theft Cortana Charging Mail Merge Google Docs User Value Digital Signage Windows 8 Unified Threat Management Downloads IT Technicians Training Fun Wires Software as a Service Disaster Shortcut Online IoT Public Speaking Cooperation G Suite Solar Print Toner Statistics Google Wallet Break Fix Cookies Competition Automobile Monitoring Spyware Business Growth Superfish Botnet Supercomputer Regulation Twitter Gadget Staffing Entertainment Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator CrashOverride Web Server Machine Learning IT Budget GPS IT Consultant Unsupported Software Computer Repair Processors Cameras Relocation Emergency Printers Tracking Meetings Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam Work/Life Balance Electronic Medical Records Domains Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications Upgrades