IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet

wireless router

Wireless networks all have unique ‘names’ so users can differentiate between them and identify the one to which they need to connect. These names are called ‘service set identifiers’ (SSID) and most people familiar with modern technology will have encountered them before when joining networks from whatever devices they use.

On corporate networks, for example, these are usually set by the network administrator and are unique to the business. A common use of bespoke SSIDs is to clearly differentiate what networks are for what purpose or a given set of people. For example, if there is a network for staff and another for the IT team, the SSIDs of both these networks will clearly show which is for what type of staff member. 

It’s more common to find manufacturer default SSIDs in homes and personal residences since it requires a degree of technical competence to change them. Manufacturer default SSIDs usually follow a uniform format with a set of letters or the manufacturer’s full name preceding a string of integers. Users can change these to a bespoke SSID by accessing their router’s admin settings, accessible through a browser using credentials supplied by their internet service provider (ISP).

Key features of an SSID

Regardless of the type of router you're using, or its manufacturer, SSIDs will typically contain up to 32 case-sensitive characters, including numbers, letters, and special characters like underscores and dashes. Fortunately, there's no minimum limit on an SSID, so you can essentially name it anything you like. However, best practice dictates that you make it as unique as possible to make it stand out.

That's if you decide to even change the SSID in the first place, as routers will typically come with sensible monikers that relate to the manufacturer or ISP – these are printed on the side of the router, or provided separately on a sticker. It's here you'll also find the password to access the Wi-Fi, as well as the username and password for accessing the admin console, which grants access to the router's configuration settings and SSID options.

How devices use SSID to connect to the internet

The first port of call when setting up a device nowadays is to connect to a network and configure internet settings for the device for the first time. The device’s UI will present you with a list of nearby network names - or SSIDs, usually accompanied by a small symbol indicating the signal strength which in itself can sometimes reveal the network to which you want to connect without having to look at the SSID. 

Networks will either appear as open or locked. Open networks are free of immediate authentication checks and will let you connect without issue, although these will usually then ask you for registration information in a browser window. Locked networks, indicated by the padlock symbol next to the SSID, will require you to input a password as you try to connect.

However, this list of available networks will only show those that have been configured to publicly display their SSID or personalised name. To access any hidden networks you will need to input their SSID or name manually, alongside the password if necessary. To prevent a network from displaying on the list of available connections, you will need to choose 'hidden' or 'disable SSID' in the router's settings.

Once your device is connected to a network, you can save its details and connect automatically each time you enable Wi-Fi.

SSID security

SSID is commonly used by most wireless networks globally. However, that doesn't mean that it's safe. In fact, it's considered to be one of the least secure ways of connecting to a network. One common problem with SSID is that even if you select the option to have it hidden from other Wi-Fi users, modern software and apps make it possible for their users to discover any networks available – including yours.

Related Resource

The Forrester Wave: Top security analytics platforms

The 11 providers that matter most and how they stack up

The Forrester Wave: Top security analytics platforms - whitepaper from IBMFree download

Unfortunately, SSID can also contribute to falling victim to a cyber attack. In 2016, TalkTalk customers had their Wi-Fi passwords stolen by hackers in a Mirai malware attack that took down TalkTalk and the Post Office's broadband networks. Hackers managed to reveal the routers' SSID code, which in turn provided them with the information on where they were being used. Cyber criminals can also take advantage of data packets that have travelled through your device. If intercepted, they can use traces of the SSID to obtain personal information, including the name of the network you use.

Apart from being a potential security issue, an SSID can also be the source of aggravation and even neighbourly disputes, especially if multiple other people in your apartment building or street use the same ISP – which is quite common, as sometimes one specific ISP is recommended in a given area. This could mean that multiple networks in close proximity will have similar default SSIDs, especially if the network names are left unchanged. If unprotected, this could lead to devices connecting to networks belonging to someone else. Whether accidental or on purpose, the owner of the network could be left with having to cover the costs of someone else exceeding the download limits.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022