BNMC Blog

Tech Term: SSID

Tech Term: SSID

When you work with technology as much as we do, there’s a bit of lingo that you pick up here and there. Of course, we then have a habit of using the terminology that we’ve picked up all the time, forgetting that not everyone has the same experience that we do. One word that causes this a lot is SSID. Here, we’ll discuss what we’re referring to when we use this term.

Wireless Connections
Mobile devices are an extremely popular method of computing now, with wireless connections utilized all the time in the office, the home, and in other (less secure) places - but security issues are a topic for another blog. To do so, a user generally connects to a wireless network, identifying it by name - this name, the service set identifier, is the SSID.

Each SSID you see in the list on your device is the name of a different network in range of your device. If the person in charge of a network is doing their job right, a password will be required to access the network, the SSID is just how each can be more easily identified.

How To Change Your SSID (And Why)
There are a few reasons why you may want to change the name of your own wireless network. Primarily, it makes it more difficult for a hacker to get into it without the password, but it also makes it easier to differentiate it from others in the area.

To change your SSID, access its settings by entering your router’s IP address into your web browser and typing in the access credentials, which are usually very generic and included with the device. From there, you should be able to find the option to alter the SSID and the password. Your SSID is case-sensitive, and can use up to 32 alphanumeric characters.

Assigning Multiple SSIDs
You can also configure your router to support a few different networks by using separate SSIDs. This comes in handy if you’re trying to protect some of your business’ internal information while still trying to offer visitors to the office Internet access.

For assistance with this, or with any other IT concern, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Hackers Business Computing Network Security Tech Term User Tips Business Software Computer Google Internet Microsoft IT Services Efficiency Productivity Hosted Solutions Ransomware Mobile Devices Communication IT Support Android Hardware Data Smartphone Small Business Backup Managed IT Services Saving Money Innovation Internet of Things Managed IT Services Data Management Data Recovery Business Continuity Cloud Computing Windows 10 Windows Browser Data Backup Business Management Workplace Tips App Microsoft Office Cybersecurity Productivity Server Facebook Phishing Remote Monitoring Office 365 Word Upgrade Outsourced IT Gmail Artificial Intelligence Disaster Recovery Windows 10 Encryption Mobile Device Passwords IT Support Tip of the week Money Chrome Managed Service Provider Infrastructure Vulnerability Applications BYOD Analytics Website communications Employer-Employee Relationship Network Smartphones Information Settings Automation Antivirus Users Google Drive Bandwidth Government Maintenance Content Filtering YouTube Access Control Router Miscellaneous IT Management Social Media Risk Management Office Tips Company Culture Managed Service Paperless Office Big Data Data storage Save Money VoIP Robot Development Two-factor Authentication Downtime Avoiding Downtime Spam Computing Outlook WiFi Scam Data loss Operating System End of Support Unified Threat Management HIPAA LiFi Virtual Reality Telephone Systems desktop Hosted Solution Mobile Security Administration Networking Mouse SaaS Firewall VPN Data Security Holiday Document Management Business Intelligence Education Business Technology Server Management Apple Storage Alert Touchscreen Wireless Virtual Private Network Quick Tips Printing Display Employee-Employer Relationship Laptop Tablet The Internet of Things Monitors Vendor Management Hacker Managing Stress Address Nanotechnology Permissions Cybercrime Social Engineering Mobility Wearable Technology Network upgrade Google Maps Co-Managed IT Alerts User Error USB Marketing Websites Patch Management Motherboard Alt Codes Managed IT Service Cables Onboarding Customer Relationship Management Fraud Cost Management Gadgets Identity Bring Your Own Device Specifications Continuity Slack Screen Reader Social Charging Safety Print Toner Heating/Cooling Multi-Factor Security Smart Office Budget Remote Computing Content Time Management Licensing Printer Dongle Information Technology Digital Payment Typing Break Fix Wires Humor Disaster Digital Signage Assessment Current Events Halloween Digital Search Best Practice Black Friday Solar Network Congestion Monitoring Emergency Smart Tech Shortcuts Servers Google Calendar Work Collaboration Writing Streaming Network Management Cooperation Apps Service Level Agreement Wi-Fi Cryptocurrency Dark Web Voice over Internet Protocol Uninterrupted Power Supply Troubleshooting Hotspot IT solutions Internet Exlporer Going Green Scary Stories Spyware Compliance Cyber Monday Google Docs Computers Spying Connectivity Hacks Running Cable Computer Care IBM Security Cameras IT Technicians Legislation Optimization Dark Data Update File Sharing Bitcoin Microsoft Excel FinTech Retail Solid State Drive Human Error Staff SharePoint Leominster Google Wallet Buisness Analysis Modem Virtual Desktop Language Techology Value Sports Politics Identity Theft Managed IT Regulations Business Growth Smart Technology How To Lenovo IoT Password Training Corporate Profile Managed Services Statistics Mirgation Recycling Legal Customer Service Mail Merge Cookies Windows 8 Blockchain MSP Office Samsung Hard Disk Drive Device Augmented Reality Unified Communications Downloads K-12 Schools Drones Automobile Dell LED VoIP Computing Infrastructure Unified Threat Management Professional Services Tech Support Shortcut Social Networking Distributed Denial of Service PowerPoint Firefox Superfish Star Wars Mobile Device Management WannaCry Bluetooth Chatbots Deep Learning Comparison eWaste Chromebook Cabling Notifications Taxes Electronic Medical Records Administrator Twitter Web Server what was your? Physical Security IT Budget Mobile Computing Upgrades Gadget GPS Emoji Crowdsourcing IT Consultant Cameras Personal Information Botnet BDR Meetings 3D Printing Tracking Cortana Regulation Cleaning Processors CCTV Machine Learning Webcam Unsupported Software Virtualization Computer Repair Relocation Error Point of Sale Ben McDonald shares Printers Mobile Data How To Work/Life Balance Recovery Travel G Suite Health Private Cloud Black Market Supercomputer CrashOverride Law Enforcement Staffing Motion Sickness

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3