NOTE: Read why this site appears to be in plain text.


Cincinnati Bell ZoomTown Internet Product Support

Are you looking for product help for ZoomTown Internet services? Please select the appropriate section below.



ZoomTown: ZoomTown Internet Security


What is Cincinnati Bell Internet Security?

Cincinnati Bell Internet Security is a complete security solution that offers better performance, better protection, and better usability; all without slowing down your computer. It also provides enhanced protection against viruses, malware, spam e-mail, and identity theft. The new browsing protection feature tells you which web sites are safe to enter and which you should avoid. The program will handle any security problems without annoying you - you only get a notification that confirms your continued safety. You are safe, no matter what you do online.


Back to Top

Do I have to be an Internet subscriber to purchase Cincinnati Bell Internet Security?

Yes. Cincinnati Bell Internet Security is made available to all Cincinnati Bell customers that use Cincinnati Bell as their Internet Service Provider.


Back to Top

I have multiple computers in my home/small business; will Cincinnati Bell Internet Security protect all of my computers?

Absolutely! Cincinnati Bell Internet Security can be installed on as many as 5 computers.


Back to Top

Does Cincinnati Bell Internet Security have a firewall?

Yes, and it also includes an application control. In fact, the cutting-edge personal firewall stops hackers from breaking into your computer, while the application control automatically allows safe applications and blocks unsafe applications - so you never have to click on annoying pop-ups to allow access.


Back to Top

Which operating systems does the service support?

The Cincinnati Bell Internet Security Service currently supports the following operating systems:

  • Windows 8.1 32-bit and 64-bit: all editions (does not support ARM based tablets).
  • Windows 8 32-bit and 64-bit: all editions (does not support ARM based tablets).
  • Windows 7 32-bit and 64-bit: all editions.
  • Windows Vista 32-bit and 64-bit: all editions, Service Pack 2 or newer.
  • Windows XP 32-bit: Home, Professional and Media Center editions: Service Pack 3 or newer.
  • Mac OS X versions 10.9 (Mavericks), 10.8 (Mountain Lion), 10.7 (Lion), 10.6 (Snow Leopard 10.6.8 or later)

Back to Top

Are there any system requirements?

Yes. Cincinnati Bell Internet Security has the following system requirements:

Microsoft Windows Vista, 7, 8 and 8.1:

  • Processor: Intel Pentium 4 or equivalent.
  • Memory: 1 GB or more.
  • Disk space: 1.2 GB of free space.
  • Internet connection is required in order to validate your subscription and receive updates.
  • Javascript must be enabled in the user's browser settings to enable active block pages.

Microsoft Windows XP:

  • Processor: Intel Pentium III 1GHz or higher.
  • Memory: 512 MB or more.
  • Disk space: 1.2 GB of free space.
  • Internet connection is required in order to validate your subscription and receive updates.
  • Javascript must be enabled in the user's browser settings to enable active block pages

Mac OS X:

  • Intel Processor
  • Memory: 1 GB or more of memory
  • Disk space: 250 MB of free space
  • Internet connection is required in order to validate your subscription and receive updates.
Which browsers are supported?

The Cincinnati Bell Internet Security Service currently supports the following browsers:

  • Internet Explorer 11 (Windows 8.1) (32-bit and 64-bit).
  • Internet Explorer 10 (Windows 8) (32-bit and 64-bit).
  • Internet Explorer 10 & 11 (Windows 7) (32-bit and 64-bit).
  • Internet Explorer 8 & 9 (Windows Vista) (32-bit and 64-bit).
  • Internet Explorer 7 & 8 (Windows XP).
  • Firefox (32-bit), two latest major versions.
  • Chrome (32-bit), two latest major versions.

Back to Top

Already purchased Cincinnati Bell Internet Security and need help getting started?

After purchasing Cincinnati Bell Internet Security you will need to follow the steps below to get started using the service.

  1. To begin login at cincinnatibell.net using your Cincinnati Bell email address (i.e. your_name@fioptics.com, your_name@zoomtown.com, your_name@fuse.net).
    • If you have forgotten you log in credentials, you can call 513-397-4357or select "Forgot Username/Forgot Password" and enter your account number to recover the log in details.
  2. On the Premium Services screen, click "Get Started."
  3. Choose your download type (PC or MAC) and make note of your Subscription Number (you will need this later on).
  4. Follow prompts to run and complete the installation.
  5. It will first scan you're device for harmful content.


  6. Next it will request permission to run the scan.


  7. Then you will be prompted to enter your subscription key (you should have obtained this in step 4).


  8. Next you will need to accept terms and conditions and complete the install




  9. You will be prompted with the option to turn on Safe Search.
  10. Then you will receive the navigation panel letting you know your install and initial scan are complete.



Back to Top
What is SSID?

SSID stands for Service Set IDentifier. This is what identifies wireless networks. It is also referred to as network name when speaking of wireless networks. The SSID acts as a login name for some wireless networks allowing you to connect to them. The SSID of accessible networks will display in your wireless configuration software. To access restricted networks you must program your wireless configuration software with the SSID of the network. For secure networks you must also enter the WEP key. For more information, visit: webopedia.com


Back to Top

What is WEP?

WEP stands for Wired Equivalent Privacy. This is a security protocol that enhances the security of a wireless network. If the SSID is the login name, then WEP acts like the password. This is often referred to as the WEP Key. If you are connecting to a router that has WEP enabled then you must enable WEP on the computer you are using to connect to that router. In addition, you must also enter the same WEP key into your computer as the router is using. This helps to ensure that everything connecting to the router is authorized to connect to it.

NOTE: It is highly recommended to enable WEP on your wireless network. Not enabling WEP can allow your connection to be used by others for purposes that may violate the terms of service.

For more information, visit: webopedia.com


Back to Top