Lodinews.com

default avatar
Welcome to the site! Login or Signup below.
|
||
Logout|My Dashboard

How to Protect Your Family from Cyber Threats

Print
Font Size:
Default font size
Larger font size

Posted: Sunday, June 16, 2013 10:00 pm | Updated: 1:33 am, Mon Jun 17, 2013.

(StatePoint) Technology has swept the heartland of America, providing families new, more efficient ways to use their home computers to manage household finances, maintain personal histories and records and store precious digital photographs.

But what happens when a computer virus or invader attacks a family’s computer? Worse still, what happens when an Internet interloper misuses technology and gains access to a family’s bank account, personal passwords and other sensitive information?

“I know a lot of people think, ‘That won’t happen to me,’” says Kelly Morgan, Vice President and General Manager for Frontier Secure, which offers computer cyber security and identity protection to residential and commercial customers nationwide. “Sadly, many people learn the hard way that cyber thefts and intrusions are real threats that can create untold difficulties for families.”

Luckily, there are easy steps you can take to mitigate cyber threats and also limit children’s access to undesirable Internet content. Look for a protection package that offers the following:

• Computer security that protects against viruses, spyware, rootkits and other malware for Windows and Mac computers, and offers e-mail filters, firewall protection, URL blocking, parental controls and real-time protection against new threats.

Backup and sharing services that automatically, silently back up unlimited computer information and provide remote access to files and documents from other Internet-enabled devices.

Technical support that includes unlimited remote telephone support from certified experts around-the-clock, and access to information about wireless network setup, troubleshooting, diagnostics and repairs, PC tune-ups and security checks, iTunes and social media basic installation and training, e-mail setup on multiple devices, Microsoft software applications setup and troubleshooting, and file back-up and storage transfer.

Identity protection that offers unlimited professional consultation on identity protection, triple bureau credit monitoring and alerts, interval identity and privacy scans and identity theft restoration.

“The need for digital protection will only grow in the coming decade as information becomes more accessible and advanced security threats are created,” says Morgan.

More information about protecting your digital life can be found at www.Frontier.com/secure.

Don’t take your cyber security for granted. By taking measures now, you can save yourself from heartache and headache in the future.

*****

Rules of Conduct

  • 1 Use your real name. You must register with your full first and last name before you can comment. (And don't pretend you're someone else.)
  • 2 Keep it clean. Please avoid obscene, vulgar, lewd, racist or sexually oriented language.
  • 3 Don't threaten. Threats of harming another person will not be tolerated.
  • 4 Be truthful. Don't lie about anyone or anything. Don't post unsubstantiated allegations, rumors or gossip that could harm the reputation of a person, company or organization.
  • 5 Be nice. No racism, sexism or any sort of -ism that is degrading to another person.
  • 6 Stay on topic. Make sure your comments are about the story. Don't insult each other.
  • 7 Tell us if the discussion is getting out of hand. Use the 'Report' link on each comment to let us know of abusive posts.
  • 8 Share what you know, and ask about what you don't.

Welcome to the discussion.

Poll

Loading…

Mailing List

Subscribe to a mailing list to have daily news sent directly to your inbox.

  • Breaking News

    Would you like to receive breaking news alerts? Sign up now!

  • News Updates

    Would you like to receive our daily news headlines? Sign up now!

  • Sports Updates

    Would you like to receive our daily sports headlines? Sign up now!

Manage Your Lists