This Day On The Street
Continue to site
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here

Frontier Communications Encourages Hyper Vigilance When It Comes To Anything Cyber

We are hooked on technology, and our dependence brings tremendous benefits and enormous risks. Cyber security concerns are not confined to governmental entities or big businesses. Cybercrime is an equal opportunity predator; governments and major companies have vast resources to fight it, but what about the rest of us?

Frontier Communications (NASDAQ: FTR) is again joining the Department of Homeland Security (DHS), the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) in supporting October as National Cyber Security Awareness Month and the “ STOP. THINK. CONNECT.”™ campaign to increase public awareness of cyber threats.

In old movies, the Calvary came to the rescue. Today, Frontier Secure is your Calvary in the fight against cyber crime. Kelly Morgan, Vice President and General Manager of Frontier Secure notes, " Frontier Secure products offer Internet Security, Cloud-based Backup & Sharing, Premium U.S.-based Tech Support, Parental Controls, Identity Protection and more.” Morgan adds, “It supplements efforts at home and work to protect valuable online information. Think of it this way: We tell our children `Never ride with a stranger;’ the same concept applies to the Internet. Every email is a potential bad character. Don’t open the door when Frontier Secure can guard the gate.”

The DHS website offers some great tips:

  • Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies.
  • Verify the authenticity of requests from companies or individuals by contacting them directly. If you are being asked to provide personal information via email, you can independently contact the company directly to verify this request.
  • Pay close attention to website URLs. Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net) to deceive unsuspecting computer users.

  • Turn off the option to automatically download attachments.
  • Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the following steps:
    • Be sure your anti-virus software is up to date.
    • Save the file to your computer or a disk.
    • Run an anti-virus scan using your computer’s software.

Social Media, Video Games, Forums, Chat Sites and more
  • Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your friend posts information about you, make sure the information is something that you are comfortable sharing with strangers.
  • Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online.
  • Be wary of strangers and cautious of potentially misleading or false information.

Mobile (Smartphone)
  • Only access the Internet over a secure network. Maintain the same vigilance you would on your computer with your mobile device.
  • Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
  • Download only trusted applications from reputable sources or marketplaces.

At Home
  • Talk to your children about Internet safety. Keep your family’s computer in an open area and talk about what they are doing online, including whom they’re talking to and the websites they’re visiting.
  • Inform children of online risks. Discuss appropriate Internet behavior suitable for the child's age, knowledge, and maturity. Talk to children about the dangers and risks of the Internet so that they are able to recognize suspicious activity and secure their personal information.

At Work
  • Restrict access and secure the personal information of employees and customers to prevent identity theft.
  • Be suspicious of unsolicited contact from individuals seeking internal organizational data or personal information. Verify a request’s authenticity by contacting the requesting entity or company directly.
  • Immediately report any suspect data or security breaches to your supervisor and/or authorities.

Use common sense
  • Avoid selecting “remember my password” or “remember my credit card number.” It’s all too easy for someone to access your computer and use this information.

“It only takes a second to open an email with the potential to wreak havoc in your home and business life,” says Morgan. “Use that second to Stop and Think before you Connect. You’ll be glad you did.”

1 of 2

Check Out Our Best Services for Investors

Action Alerts PLUS

Portfolio Manager Jim Cramer and Director of Research Jack Mohr reveal their investment tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
Quant Ratings

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
Stocks Under $10

David Peltier uncovers low dollar stocks with serious upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
14-Days Free
Only $9.95
14-Days Free
Dividend Stock Advisor

David Peltier identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Updates with exact steps to take - BUY, HOLD, SELL
Trifecta Stocks

Every recommendation goes through 3 layers of intense scrutiny—quantitative, fundamental and technical analysis—to maximize profit potential and minimize risk.

Product Features:
  • Model Portfolio
  • Intra Day Trade alerts
  • Access to Quant Ratings
Real Money

More than 30 investing pros with skin in the game give you actionable insight and investment ideas.

Product Features:
  • Access to Jim Cramer's daily blog
  • Intraday commentary and news
  • Real-time trading forums
Only $49.95
14-Days Free
14-Days Free
AAPL $93.02 -0.64%
FB $118.14 0.07%
GOOG $699.25 0.51%
TSLA $213.67 -4.00%
YHOO $37.10 3.10%


Chart of I:DJI
DOW 17,693.00 +41.74 0.24%
S&P 500 2,054.48 +3.36 0.16%
NASDAQ 4,733.0830 +7.4440 0.16%

Free Reports

Top Rated Stocks Top Rated Funds Top Rated ETFs