BNMC Blog

Tech Term: SSID

Tech Term: SSID

When you work with technology as much as we do, there’s a bit of lingo that you pick up here and there. Of course, we then have a habit of using the terminology that we’ve picked up all the time, forgetting that not everyone has the same experience that we do. One word that causes this a lot is SSID. Here, we’ll discuss what we’re referring to when we use this term.

Wireless Connections
Mobile devices are an extremely popular method of computing now, with wireless connections utilized all the time in the office, the home, and in other (less secure) places - but security issues are a topic for another blog. To do so, a user generally connects to a wireless network, identifying it by name - this name, the service set identifier, is the SSID.

Each SSID you see in the list on your device is the name of a different network in range of your device. If the person in charge of a network is doing their job right, a password will be required to access the network, the SSID is just how each can be more easily identified.

How To Change Your SSID (And Why)
There are a few reasons why you may want to change the name of your own wireless network. Primarily, it makes it more difficult for a hacker to get into it without the password, but it also makes it easier to differentiate it from others in the area.

To change your SSID, access its settings by entering your router’s IP address into your web browser and typing in the access credentials, which are usually very generic and included with the device. From there, you should be able to find the option to alter the SSID and the password. Your SSID is case-sensitive, and can use up to 32 alphanumeric characters.

Assigning Multiple SSIDs
You can also configure your router to support a few different networks by using separate SSIDs. This comes in handy if you’re trying to protect some of your business’ internal information while still trying to offer visitors to the office Internet access.

For assistance with this, or with any other IT concern, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Network Security Hackers Productivity Google Malware Business Microsoft Software Computer Hosted Solutions Tech Term Ransomware Communication Data Internet IT Services Efficiency Mobile Devices Small Business IT Support Workplace Tips Backup Hardware Smartphone Cloud Computing Data Recovery Android Saving Money Innovation Business Continuity Managed IT Services Microsoft Office Windows Data Management Users Managed IT Services Social Media Information Data Backup Windows 10 Browser Mobile Device Internet of Things Server Facebook Phishing Business Management Windows 10 Upgrade App Word Office 365 Outsourced IT Gmail Vulnerability Cybersecurity Passwords Productivity communications Artificial Intelligence Disaster Recovery Network Encryption Remote Monitoring Smartphones Chrome Gadgets Managed Service Provider Save Money Infrastructure Miscellaneous Managed Service Virtual Reality Tip of the week Analytics Website BYOD Employer-Employee Relationship IT Support Money VoIP Applications Robot Unified Threat Management Google Drive Bandwidth Automation Company Culture Content Filtering Employee-Employer Relationship Apps YouTube Risk Management Education Maintenance Apple Office Tips Antivirus Government Hacker Data storage Big Data Access Control Display VPN IT Management Paperless Office Settings Router Touchscreen Monitors Business Intelligence LiFi Virtual Private Network Vendor Management Quick Tips Chromebook Hosted Solution Administration Tablet Data loss Telephone Systems Mouse End of Support desktop Augmented Reality Firewall Two-factor Authentication Managing Stress Avoiding Downtime Storage SaaS Printing Development Document Management Scam Computers Virtualization Laptop Solid State Drive Holiday Wireless HIPAA The Internet of Things Networking Retail Alert Hard Disk Drive Mobile Security Outlook Data Security Spam Computing Downtime WiFi Server Management Bring Your Own Device Operating System Business Technology Social SharePoint Troubleshooting Compliance Budget Microsoft Excel iOS Hotspot Tech Support Internet Exlporer Google Maps Typing Humor Techology Spying National Security IT Technicians Optimization Information Technology Managed IT Smart Technology Security Cameras Connectivity Analysis Students Staff Leominster Current Events Statistics Human Error Social Engineering Modem FinTech Best Practice How To Lenovo Downloads Regulations Halloween Mail Merge Blockchain Scalability Language Websites Value Cryptocurrency VoIP Unified Threat Management Updates Mirgation Recycling Shortcut Distributed Denial of Service Managed Services IoT Digital Payment Mixed Reality K-12 Schools Disaster IT solutions Going Green Bluetooth Comparison Device Safety Cookies MSP Digital Firefox Google Docs Superfish Collaboration Hacks LED Remote Computing Social Networking Scary Stories Address Permissions Migration Computing Infrastructure Professional Services Bitcoin User Error PowerPoint Network Congestion Chatbots eWaste Running Cable Google Wallet Patch Management Managed IT Service Laptops Star Wars Data Breach Wearable Technology Network upgrade Uninterrupted Power Supply Specifications Mobility Nanotechnology Buisness Spyware Business Growth Customer Relationship Management Alerts USB File Sharing Virtual Desktop Password Heating/Cooling Multi-Factor Security Co-Managed IT Writing Motherboard Cables Sports Computer Care IBM Legal Wi-Fi Windows 8 Time Management Printer Onboarding Identity Continuity Unified Communications Drones Break Fix Software as a Service Fraud Cost Management Slack Dark Data Hard Disk Drives Update Smart Office Search Black Friday Print Toner Screen Reader Charging Identity Theft Licensing Dongle Mobile Device Management Servers Google Calendar Content Wires Training Corporate Profile Deep Learning Emergency Messaging Network Management Digital Signage Solar G Suite Dark Web Entertainment Politics Assessment Automobile Monitoring Customer Service Solid State Drives Work Cybercrime Dell Cyber Monday Shortcuts Smart Tech Alt Codes Employee-Employer Relationships Cooperation Private Cloud Service Level Agreement Cabling Legislation Streaming Office Samsung Voice over Internet Protocol Marketing WannaCry Black Market Taxes Administrator Web Server what was your? Law Enforcement IT Budget Electronic Medical Records Notifications GPS Printers Twitter IT Consultant Physical Security Emoji Cameras Upgrades Gadget Meetings Crowdsourcing Tracking Cleaning Personal Information Botnet Cortana CCTV 3D Printing Webcam Machine Learning Processors Windows 7 Unsupported Software Error Point of Sale Ben McDonald shares Computer Repair Relocation Travel BDR Mobile Data Recovery How To Work/Life Balance Regulation Supercomputer CrashOverride Health Motion Sickness Mobile Computing Staffing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3