Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Wireless Connections
With the popularity of mobile devices, wireless communications are more important than ever before. It doesn’t matter if you’re in the office, at home, or out and about while traveling; security will be a major concern. That’s not the point we’re making here, though. We’re discussing wireless networks, which are defined by their Service Set Identifier, or SSID.

Each of the SSIDs you see on your device is the name of a wireless network that your device is in range of. These networks should be protected by a password, but security isn’t really the point of the SSID, as it’s meant to help you determine which connection belongs to you.

How and Why to Change Your SSID
It’s generally only beneficial to change the SSID of your wireless network specifically because it makes it more difficult for a hacker to get into it without the password. Furthermore, it provides a way to identify the network from others nearby. You can change your SSID by entering your router’s IP address into your web browser and typing in the access credentials. These are generic by design to make it easy for users to change their settings, and you’ll find these on your device. You can then alter the SSID and password as you see fit, being sure to keep in mind that the SSID is case-sensitive up to 32 characters.

Assigning Multiple SSIDs
The option is also there to configure your router to support several different networks by using separate SSIDs. This helps if you want to protect your business’ internal information while still allowing visitors in your office. Think of it like your “guest” network.

For more assistance with your wireless networks, reach out to Decatur Computers Inc. at 217-475-0226.

Social Media Pros and Cons
A Look at Facebook’s Ongoing Data Troubles
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Business Computing Tech Term Hackers Productivity Software Data Data Backup IT Support Efficiency Android Innovation Business Management Malware User Tips Data Recovery Google Communications Computer Cybersecurity Collaboration Internet Email Smartphone Small Business Windows 10 Backup IT Services Cloud Managed IT Services Hosted Solutions Mobile Device Phishing Ransomware Communication Microsoft Office Browser Artificial Intelligence Business Technology Social Media Hardware BDR Facebook VoIp Business Cybercrime Cost Management Blockchain Outsourced IT Access Control Office 365 Cloud Computing Managed Service Mobile Device Management App Applications IT Management Automation Mobile Devices Information Apps Workplace Tips Antivirus Two-factor Authentication Update Maintenance Gadgets Smartphones Data Management Managed IT Services Saving Money Disaster Recovery Websites Encryption Server Network Holiday Data Security Patch Management Scam Microsoft Hard Drive Passwords Bitcoin Business Continuity Internet of Things Operating System Mobility Conferencing Money Social Engineering Data loss Search Spam Tech Terms Word Remote Monitoring Big Data Hacking Apple Data Protection Quick Tips Touchscreen Digital Gmail Cooperation Users SaaS Project Management Saving Time Windows Data Breach Vulnerabilities Augmented Reality Managed Service Provider Start Menu Google Maps Laptop Document Management Save Money Bandwidth Healthcare Alert Printer VPN Analytics Vendor Law Enforcement Vulnerability Social Network Modem Audit How to HTML Trends Redundancy Budget Password Cleaning Term Knowledge News Paperless Office Network Management Help Desk Business Cards Virtualization iPhone Monitoring Uninterrupted Power Supply Google Drive Identity Theft Automobile Sports Printing eWaste Training WiFi Travel Processor DDoS Telephone Systems Customer Resource management SSID Virus Virtual Assistant Gamification Entertainment Information Technology Computers Management Google Play Fake News Unified Threat Management Multi-factor Authentication Database IT Support Service Level Agreement Vendor Management Managed IT Worker Best Practice Telephony Desktop Chromebook Government Robot Equifax Wireless Username Navigation Nanotechnology Consultant Telephone System Computer Care Excel YouTube Devices Data Analysis Comparison Vendor Mangement Mobile Technology Computing Security Cameras Device security Tactics Going Green Google Calendar Downtime Emails Unsupported Software History VoIP Backup and Disaster Recovery User Tip Legal Access Startup Evernote SharePoint Electronic Medical Records Medical IT Tip of the week Settings Hard Drive Disposal Compliance Content Fileless Malware Specifications Business Mangement Error Social Microsoft Excel Website Download Bookmark Outlook Piracy Bluetooth Distributed Denial of Service IBM Twitter Addiction Downloads Running Cable Spyware Computing Infrastructure Miscellaneous Disaster Virtual Reality Screen Reader Health IT PowerPoint Administration email scam Regulations BYOD Directions Emergency Television Solid State Drive Telephone Router Cryptocurrency Tablet Software as a Service Samsung Upload Browsers Google Docs Software License Wireless Headphones Upgrades Freedom of Information Corporate Profile Time Management Mobile Security Machine Learning Proxy Server Cabling Networking Legislation Unified Threat Management Voice over Internet Protocol Tech Company Culture Professional Services Unified Communications Cortana Employer-Employee Relationship Accountants Microchip Mouse Windows 10 Marketing Office Retail Managing Stress Office Tips Multi-Factor Security Printers Regulation CrashOverride

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.