Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Wireless Connections
With the popularity of mobile devices, wireless communications are more important than ever before. It doesn’t matter if you’re in the office, at home, or out and about while traveling; security will be a major concern. That’s not the point we’re making here, though. We’re discussing wireless networks, which are defined by their Service Set Identifier, or SSID.

Each of the SSIDs you see on your device is the name of a wireless network that your device is in range of. These networks should be protected by a password, but security isn’t really the point of the SSID, as it’s meant to help you determine which connection belongs to you.

How and Why to Change Your SSID
It’s generally only beneficial to change the SSID of your wireless network specifically because it makes it more difficult for a hacker to get into it without the password. Furthermore, it provides a way to identify the network from others nearby. You can change your SSID by entering your router’s IP address into your web browser and typing in the access credentials. These are generic by design to make it easy for users to change their settings, and you’ll find these on your device. You can then alter the SSID and password as you see fit, being sure to keep in mind that the SSID is case-sensitive up to 32 characters.

Assigning Multiple SSIDs
The option is also there to configure your router to support several different networks by using separate SSIDs. This helps if you want to protect your business’ internal information while still allowing visitors in your office. Think of it like your “guest” network.

For more assistance with your wireless networks, reach out to Decatur Computers Inc. at 217-475-0226.

Social Media Pros and Cons
A Look at Facebook’s Ongoing Data Troubles


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Privacy Tech Term Hackers Productivity IT Support User Tips Efficiency Innovation Data Software Data Backup Cybersecurity Google Android Business Management Malware Computer Email Data Recovery Collaboration Smartphone Internet Communications Small Business Communication Windows 10 IT Services Backup Hardware Cloud Phishing Hosted Solutions Managed IT Services Mobile Device Artificial Intelligence Ransomware Mobile Devices Facebook VoIp IT Management Business Microsoft Office Social Media Outsourced IT BDR Cloud Computing Automation Business Technology Browser Cost Management Network Two-factor Authentication Smartphones App Managed Service Blockchain Access Control Office 365 Applications Mobile Device Management Information Cybercrime Holiday Server Gadgets Patch Management Data Security Internet of Things Scam Data Management Analytics Hard Drive Managed IT Services Saving Money Disaster Recovery Antivirus Update Maintenance Vulnerabilities Microsoft Passwords Apps Encryption Workplace Tips Websites Printer VPN Vulnerability Users SaaS Quick Tips Conferencing Bitcoin Cooperation Operating System Mobility Business Continuity Virtual Assistant Data loss Hacking Apple Saving Time Social Engineering Money Upgrade Search Spam Remote Monitoring Save Money Tech Terms Big Data Alert Word Gmail Data Protection Project Management Data Breach Healthcare Touchscreen Digital Augmented Reality Windows Law Enforcement Bandwidth Managed Service Provider Vendor Start Menu Document Management Google Maps Laptop Telephone Systems Networking Legislation Network Management Help Desk IBM Emergency Television Mobile Security Monitoring Term Running Cable Spyware Solutions Accountants Sports Solid State Drive Google Docs IT Support Company Culture Travel Processor Administration iPhone Cryptocurrency Best Practice Customer Resource management SSID Cleaning Gamification Entertainment Tablet Software as a Service Freedom of Information Wireless HTML Integration Unified Communications Cortana Consultant Business Cards Virtualization Service Level Agreement Vendor Management Corporate Profile Time Management Mouse Paperless Office Management Google Play Cabling Unsupported Software eWaste Training Redundancy Budget Identity Theft Username Navigation Employer-Employee Relationship Retail Audit Telephone System Password Information Technology Computers Data Analysis How to Knowledge News Printing Going Green DDoS Multi-factor Authentication Database Computing Security Cameras Robot Equifax User Tip Uninterrupted Power Supply Google Drive Desktop Chromebook Evernote Electronic Medical Records Medical IT Managed IT Mobile Technology Nanotechnology Content Fileless Malware Virus Fake News Devices Worker Government Downtime Emails Download Bookmark Unified Threat Management Device security Tactics Error Social Upgrades Startup Addiction Telephony Comparison Samsung Backup and Disaster Recovery Miscellaneous Windows 7 Computer Care Excel Hard Drive Disposal Compliance Health IT PowerPoint Vendor Mangement Google Calendar BYOD Directions YouTube Unified Threat Management Router Legal Piracy Bluetooth Upload Browsers SharePoint Website Telephone Tip of the week Computing Infrastructure Machine Learning Proxy Server History VoIP Specifications Twitter Tech Access Microsoft 365 email scam Regulations Professional Services Business Mangement Outlook Virtual Reality Screen Reader Microchip Settings Voice over Internet Protocol Microsoft Excel Social Network Modem Downloads Automobile Software License Wireless Headphones Trends Disaster Distributed Denial of Service WiFi Office CrashOverride Office Tips Managing Stress Transportation Printers Multi-Factor Security Windows 10 Regulation Marketing

Latest Blog

The capabilities of business technology are truly incredible, and they’re only becoming more impressive. This means that the solutions you have in place now will certainly need to be upgraded to other options at some point.

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.