Our Blog: Stuff we think you should know

Tech Term: SSID

Tech Term: SSID

When you work with technology as much as we do, there’s a bit of lingo that you pick up here and there. Of course, we then have a habit of using the terminology that we’ve picked up all the time, forgetting that not everyone has the same experience that we do. One word that causes this a lot is SSID. Here, we’ll discuss what we’re referring to when we use this term.

Wireless Connections
Mobile devices are an extremely popular method of computing now, with wireless connections utilized all the time in the office, the home, and in other (less secure) places - but security issues are a topic for another blog. To do so, a user generally connects to a wireless network, identifying it by name - this name, the service set identifier, is the SSID.

Each SSID you see in the list on your device is the name of a different network in range of your device. If the person in charge of a network is doing their job right, a password will be required to access the network, the SSID is just how each can be more easily identified.

How To Change Your SSID (And Why)
There are a few reasons why you may want to change the name of your own wireless network. Primarily, it makes it more difficult for a hacker to get into it without the password, but it also makes it easier to differentiate it from others in the area.

To change your SSID, access its settings by entering your router’s IP address into your web browser and typing in the access credentials, which are usually very generic and included with the device. From there, you should be able to find the option to alter the SSID and the password. Your SSID is case-sensitive, and can use up to 32 alphanumeric characters.

Assigning Multiple SSIDs
You can also configure your router to support a few different networks by using separate SSIDs. This comes in handy if you’re trying to protect some of your business’ internal information while still trying to offer visitors to the office Internet access.

For assistance with this, or with any other IT concern, reach out to us at 866.625.3560.

500 Million Users Exposed by Marriott
Powerful Physical Security Options


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Productivity Internet Network Security Google Hosted Solutions Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Microsoft Office Saving Money Productivity Data Recovery Browser Data Management Business Continuity Managed IT Services Cloud Computing Innovation Internet of Things Server Users Upgrade Word Windows Managed IT Services Gmail Office 365 Facebook Data Backup Disaster Recovery Smartphones Phishing Social Media App Outsourced IT Passwords Windows 10 Vulnerability Cybersecurity Managed Service Provider VoIP Remote Monitoring Encryption Network Employer-Employee Relationship Chrome Artificial Intelligence Mobile Device Business Management communications BYOD Spam Managed Service Website Save Money Information Apple Applications Analytics Office Tips Infrastructure IT Support Hacker Content Filtering Money Big Data Government Miscellaneous Tip of the week Virtualization Risk Management Employee-Employer Relationship Antivirus Wireless Access Control Router Virtual Reality Customer Service Data storage Paperless Office Display Firewall Settings IT Management Two-factor Authentication Robot WiFi Maintenance Bandwidth Avoiding Downtime Printing YouTube The Internet of Things Automation Tablet Education IBM Company Culture Recovery Solid State Drive Computing Networking Google Drive Password Vendor Management Administration Mobile Device Management Document Management Mouse HIPAA Customer Relationship Management Hard Disk Drive VPN Data Security LiFi Wi-Fi Computers Laptop Development Data loss Business Technology Apps Storage Virtual Private Network Augmented Reality Retail Server Management Safety Hacking Mobile Security SaaS Touchscreen Outlook Downtime Hosted Solution Telephone Systems Monitors Unified Threat Management Presentation Holiday Quick Tips Business Intelligence Scam Operating System Office Chromebook Wireless Technology End of Support Gadgets Search Collaboration VoIP Printer Wearable Technology Bring Your Own Device sip Security Cameras Net Neutrality Screen Reader How To How To Computing Infrastructure Dongle Experience Unified Communications Recycling Human Error Smart Technology Motherboard Students IT service Heating/Cooling Legislation Identity Bitcoin Network Congestion Running Cable MSP Scalability Tech Support WannaCry Permissions Assessment PowerPoint File Sharing Time Management Best Practice telephony Managing Stress Managed Services Computer Care FCC Smart Tech Information Technology Virtual Desktop Firefox Alerts Service Level Agreement Google Docs eWaste Device Samsung Cabling Distributed Denial of Service Writing Buisness Hard Drives IT solutions LED BDR Servers Comparison Windows 8 Lithium-ion battery Migration Websites Identity Theft Fraud Internet Exlporer Onboarding Network Management SharePoint Business Growth Cables Laptops Training Title II Connectivity Google Wallet Refrigeration Techology Licensing Continuity Mobility G Suite User Managed IT Managed IT Service Modem Current Events 5G Slack Automobile Value Legal Cortana Smart Office Co-Managed IT Public Speaking Google Maps Specifications Compliance Halloween Charging Digital Lenovo Digital Signage Competition Downloads IT Technicians Alt Codes Dark Data Wires Software as a Service Mail Merge Online IoT Drones Fun Unified Threat Management Cooperation Solar Print Toner Disaster Shortcut Break Fix Cookies Going Green Social Engineering Monitoring Hotspot Professional Services Work Content Remote Computing Statistics Black Friday Regulations Social Scary Stories Messaging Spyware Superfish Desktop Update Multi-Factor Security Mirgation Typing IP Address Cybercrime Voice over Internet Protocol Entertainment Address Microsoft Excel Star Wars Undo User Error Staff Deep Learning Humor Shortcuts Uninterrupted Power Supply Patch Management Dark Web Nanotechnology Spying Language USB Knowledge Optimization Streaming Bluetooth Cyber Monday Social Networking Hacks Sports Analysis Employee-Employer Relationships Digital Payment Marketing Troubleshooting Google Calendar Chatbots Cryptocurrency Mobile Office FinTech iOS Politics Application Corporate Profile Blockchain Cost Management Budget Health Cleaning Alert CCTV Private Cloud Printers Emoji Webcam Emergency Electronic Medical Records Work/Life Balance Mobile Computing Error Physical Security Black Market Point of Sale Domains Travel Law Enforcement Upgrades Notifications Twitter Windows 7 Botnet Supercomputer Motion Sickness Gadget Staffing 3D Printing Crowdsourcing Taxes Personal Information Administrator Web Server Regulation Machine Learning IT Budget GPS Unsupported Software IT Consultant Computer Repair Processors Cameras Relocation CrashOverride Meetings Tracking Mobile Data