facebook linkedin twitter

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Wireless Connections
With the popularity of mobile devices, wireless communications are more important than ever before. It doesn’t matter if you’re in the office, at home, or out and about while traveling; security will be a major concern. That’s not the point we’re making here, though. We’re discussing wireless networks, which are defined by their Service Set Identifier, or SSID.

Each of the SSIDs you see on your device is the name of a wireless network that your device is in range of. These networks should be protected by a password, but security isn’t really the point of the SSID, as it’s meant to help you determine which connection belongs to you.

How and Why to Change Your SSID
It’s generally only beneficial to change the SSID of your wireless network specifically because it makes it more difficult for a hacker to get into it without the password. Furthermore, it provides a way to identify the network from others nearby. You can change your SSID by entering your router’s IP address into your web browser and typing in the access credentials. These are generic by design to make it easy for users to change their settings, and you’ll find these on your device. You can then alter the SSID and password as you see fit, being sure to keep in mind that the SSID is case-sensitive up to 32 characters.

Assigning Multiple SSIDs
The option is also there to configure your router to support several different networks by using separate SSIDs. This helps if you want to protect your business’ internal information while still allowing visitors in your office. Think of it like your “guest” network.

For more assistance with your wireless networks, reach out to Computerware at (703) 821-8200.

Social Media Pros and Cons
A Look at Facebook’s Ongoing Data Troubles


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices Smartphones User Tips Innovation Gadgets Business Continuity Microsoft Office VoIP Disaster Recovery Network Android Social Media Collaboration Mobile Office Virtualization Data Backup Server Productivity Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Tech Term communications Upgrade Ransomware Windows 10 Unified Threat Management Windows IT Support Passwords Holiday Facebook Remote Monitoring Operating System Vendor Management Managed IT services Cybersecurity Apps Mobile Computing BYOD Remote Computing Phishing Automation Users BDR WiFi Mobile Device Marketing Analytics The Internet of Things Apple Data Management Firewall History Outsourced IT Alert Artificial Intelligence Managed IT Services Browser Internet of Things Save Money App IT Consultant Encryption Big data Content Filtering Going Green Office 365 Office Bring Your Own Device Cloud Computing Gmail Maintenance Antivirus Printer Spam Bandwidth Health Cost Management Lithium-ion Battery Saving Time Best Practice Information Technology Business Technology Outlook Budget Windows 8 Two-factor Authentication Help Desk Wireless Technology Windows 10 Tech Support Search Virus Cybercrime Hiring/Firing Managed IT Hard Drives Phone System Hacking Training Access Control Computers VPN IBM Travel Blockchain Update Recovery Employer-Employee Relationship Money Document Management Healthcare Proactive IT Running Cable Data storage Applications It Management Hard Drive Intranet Twitter Networking Education Managed Service Legal Mobility Augmented Reality PowerPoint Regulations Customer Service Risk Management Humor SaaS Website Administration Government Save Time Information Law Enforcement Compliance iPhone Computer Repair Current Events Flexibility Hacker Social Networking Black Market Cryptocurrency Data Security Excel File Sharing Laptop Business Growth Google Maps User Customer Relationship Management Patch Management Data Loss Fax Server Social Engineering Social Scam Paperless Office Wireless Data Breach DDoS Sports Computing Business Intelligence Disaster End of Support Digital Digital Payment Hosted Solution Project Management Robot Websites Router Downtime Securty Word Machine Learning Avoiding Downtime Comparison Tablet Company Culture Value Telephone Systems Solid State Drive Password Cortana Mouse Bluetooth Uninterrupted Power Supply Public Cloud Pain Points Programming User Error Statistics Processors Bitcoin Co-managed IT Identity Theft Network Congestion Google Docs USB Data Protection Presentation Experience Monitors Cleaning Cooperation Virtual Desktop Vendor Virtual Reality Lifestyle Specifications Safety Conferencing Politics Streaming Media Office Tips Automobile Gaming Console Emails YouTube Chromebook Documents Redundancy Heating/Cooling Computing Infrastructure Webcam Hack Net Neutrality Unified Communications Settings Entertainment Monitoring Text Messaging How To Chrome Storage Evernote Private Cloud Download Management Computer Accessories IT service Retail Telephony Start Menu Tech Terms Inbound Marketing Mobile Technology Microchip Taxes eWaste Vulnerabilities Distributed Denial of Service Trending Software as a Service Finance Electronic Medical Records G Suite LiFi Troubleshooting Google Drive Windows Server 2008 Nanotechnology Social Network Term Employer Employee Relationship Entrepreneur Desktop Recording Licensing Archive HIPAA Spyware Mobile Payment Startup Asset Tracking Directions Hacks Physical Security Skype Environment Vulnerability Business Cards Service Level Agreement Deep Learning Electricity Competition Printing Username Dark Web Banking Botnet Work/Life Balance Electronic Payment Unified Threat Management Backup and Disaster Recovery SSID Relocation Tablets Gamification Health IT Sync Visible Light Communication Memory Business Owner Windows 7 Screen Reader Customer Resource management Processing Webinar Point of Contact IT consulting cache IP Address Television Smart Tech Distribution Managed IT Service Notifications Upselling CCTV Piracy Upload Video Surveillance WannaCry Application Downloads HTML Bookmark Business Metrics Computer Malfunction Human Resources Fiber-Optic Database Reliable Computing Corporate Profile Mobile Security In Internet of Things Saving ZTime Recycling Advertising Flash Time Management Freedom of Information Telephone System Google Play CIO Analytic Windows XP Assessment SharePoint Multi-Factor Security Cost Processor Staffing Product Reviews Google Wallet Software License Trends Scalability Debate Read Displays Digital Signature Google Calendar Devices Browsers Best Practives Harddrive Motion Sickness Society Fraud Tip of the week Tactics Medical IT Teamwork VoIP UTM Content User Tip Touchscreen News Security Cameras Messenger GPS Tracking Micrsooft External Harddrive Microserver Device Management Consultation Legislation Error Navigation Rental Service Meetings Drones Knowledge IT Plan Enterprise Resource Planning Cabling Content Management Technology Tips Accountants A.I. Data Analysis Web Server Business Managemenet PDF email scam Virtual Assistant Addiction Professional Services Best Available Keyboard Audit Multi-factor Authentication Wi-Fi Get More Done Administrator Thin CLient Permissions Language Fake News GDPR Books 3D Workers Ebay Smart Phones Turn Key online Currency Domains Data Warehousing Wireless Headphones Telephone Tech Printer Server Supercomputer Migration Connected Devices Voice over Internet Protocol Worker switches Writing Access Public Speaking Equifax Fleet Tracking Fileless Malware Trojan Music Emergency Hard Drive Disposal Network Management Upgrades Shortcut Computer Care Device security MSP Proxy Server Leadership LinkedIn Microsoft Excel Modem Reading Organize Adminstration Samsung Pirating Information 3D Printing Managing Stress CrashOverride Regulation Capital Printers Productuvuty