Service Set Identifier (SSID)

10th June 2021 | Cybrary Service Set Identifier (SSID)


ssid cyber library

A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local Area Network (WLAN). An SSID is often referred to as a “network name.” This name allows systems to connect to the network while multiple independent networks operate in the same physical area, ensuring data gets sent to the correct destination. A wireless network administrator sets the name of the router, or base station, to “Office.” This will be the name that users see when browsing available wireless networks to identify the wireless network from other nearby networks.

Businesses in the same building can operate their own WLAN, comprised of systems and workstations using unique SSID identifiers. The purpose of an SSID is to help workstations in ‘Business A’ find and connect to devices in ‘Business A’, ignoring devices belonging to ‘Business B’. 

What does this mean for an SMB?

While the typical SMB Owner may not need to know about the intricacies of SSIDs they should understand the need to secure company wifi networks. CyberHoot recommends you take the following actions to improve your overall security and reduce the likelihood of falling victim to a Wi-Fi Hacking cyberattack

  • Access only websites that use HTTPS in their URL. 
  • Disable Wi-Fi, AWDL (AirDrop), and BlueTooth when they’re not in use.
  • Never connect to insecure Guest (Public) Wi-Fi networks to do critical personal or professional work unless you are using a VPN.

Additionally, all businesses should adopt the following security measures:

To learn more about Wi-Fi Security, watch our short Wi-Fi training video:

Sources: 

TechTerms

TechTarget

PCMag

Additional Reading:

What Is an SSID, or Service Set Identifier?

Wi-Fi 6 Explained

Related Terms:

Wi-Fi 6E

Gateway

Guest Wi-Fi Network

Find out how CyberHoot can secure your business.


Schedule a demo

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more