This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration. Need a new registration confirmation email? Click here
We are hooked on technology, and our dependence brings tremendous benefits and enormous risks. Cyber security concerns are not confined to governmental entities or big businesses. Cybercrime is an equal opportunity predator; governments and major companies have vast resources to fight it, but what about the rest of us?
Frontier Communications (NASDAQ: FTR) is again joining the Department of Homeland Security (DHS), the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) in supporting October as
National Cyber Security Awareness Month and the “
STOP. THINK. CONNECT.”™ campaign to increase public awareness of cyber threats.
In old movies, the Calvary came to the rescue. Today,
Frontier Secure is your Calvary in the fight against cyber crime. Kelly Morgan, Vice President and General Manager of Frontier Secure notes, "
Frontier Secure products offer Internet Security, Cloud-based Backup & Sharing, Premium U.S.-based Tech Support, Parental Controls, Identity Protection and more.” Morgan adds, “It supplements efforts at home and work to protect valuable online information. Think of it this way: We tell our children `Never ride with a stranger;’ the same concept applies to the Internet. Every email is a potential bad character. Don’t open the door when Frontier Secure can guard the gate.”
The DHS website offers some
Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies.
Verify the authenticity of requests from companies or individuals by contacting them directly. If you are being asked to provide personal information via email, you can independently contact the company directly to verify this request.
Pay close attention to website URLs. Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net) to deceive unsuspecting computer users.
Turn off the option to automatically download attachments.
Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the following steps:
Be sure your anti-virus software is up to date.
Save the file to your computer or a disk.
Run an anti-virus scan using your computer’s software.
Social Media, Video Games, Forums, Chat Sites and more
Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your friend posts information about you, make sure the information is something that you are comfortable sharing with strangers.
Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online.
Be wary of strangers and cautious of potentially misleading or false information.
Only access the Internet over a secure network. Maintain the same vigilance you would on your computer with your mobile device.
Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
Download only trusted applications from reputable sources or marketplaces.
Talk to your children about Internet safety. Keep your family’s computer in an open area and talk about what they are doing online, including whom they’re talking to and the websites they’re visiting.
Inform children of online risks. Discuss appropriate Internet behavior suitable for the child's age, knowledge, and maturity. Talk to children about the dangers and risks of the Internet so that they are able to recognize suspicious activity and secure their personal information.
Restrict access and secure the personal information of employees and customers to prevent identity theft.
Be suspicious of unsolicited contact from individuals seeking internal organizational data or personal information. Verify a request’s authenticity by contacting the requesting entity or company directly.
Immediately report any suspect data or security breaches to your supervisor and/or authorities.
Use common sense
Avoid selecting “remember my password” or “remember my credit card number.” It’s all too easy for someone to access your computer and use this information.
“It only takes a second to open an email with the potential to wreak havoc in your home and business life,” says Morgan. “Use that second to Stop and Think before you Connect. You’ll be glad you did.”