How Can We Help You?

Browse or search below to find the information you're looking for.

 
Help Center / Other Services / Internet Security

Internet Security

Yes, and it also includes an application control. In fact, the cutting-edge personal firewall stops hackers from breaking into your computer, while the application control automatically allows safe applications and blocks unsafe applications - so you never have to click on annoying pop-ups to allow access.

See Also
How do I protect my computer from malware or viruses?
How do I install Internet Security?

Yes. Cincinnati Bell Internet Security is made available to all Cincinnati Bell customers that use Cincinnati Bell as their Internet Service Provider.

See Also
Do I have to be an Internet subscriber to purchase Cincinnati Bell Internet Security?
Does Cincinnati Bell Internet Security have a firewall?

After purchasing Cincinnati Bell Internet Security you will need to follow the steps below to get started using the service.

  1. To begin login at cincinnatibell.net using your Cincinnati Bell email address (i.e. your_name@fioptics.com, your_name@zoomtown.com, your_name@fuse.net).

    If you have forgotten your log in credentials, you can call 513-397-4357 or select "Forgot Username/Forgot Password" and enter your account number to recover the log in details.
  2. On the Premium Services screen, click "Get Started."
  3. Choose your download type (PC or MAC) and make note of your Subscription Number (you will need this later on).
  4. Follow prompts to run and complete the installation.
  5. It will first scan your device for harmful content.
  6. Next it will request permission to run the scan.
  7. Then you will be prompted to enter your subscription key (you should have obtained this in step 4).
  8. Next you will need to accept terms and conditions and complete the install.
  9. You will be prompted with the option to turn on Safe Search.
  10. Then you will receive the navigation panel letting you know your install and initial scan are complete.

See Also
Does Cincinnati Bell Internet Security have a firewall?
Will Cincinnati Bell Internet Security protect all of my computers?

Internet Explorer:
Most malware problems occur with Internet Explorer. To protect your computer from malware issues, tighten up your browser's security settings using the following methods:

  • Click Start.
  • Click Control Panel.
  • Click Internet Options and click the Security tab.
  • Click the Custom Level button.
  • Click the Prompt radio button under the Download signed ActiveX controls option.
  • Click the radio button next to the Disable option for ActiveX controls that are not marked as safe and are not signed.
  • Click OK to close the Security Settings window.
  • Click OK when the Warning dialog box appears.
  • Click OK to close the Internet Properties window.

Another important part of prevention is installing the latest security patches from Microsoft and buying or downloading for free a trusted anti-virus software such as what Cincinnati Bell offers by visiting www.cincinnatibell.net and selecting Internet Security under Premium Services.

Finally, make sure you carefully read the terms of service from any website you visit before you download software.

 

See Also
How do I install Internet Security?
How do I protect my computer from malware or viruses?

Cincinnati Bell Internet Security offers up to date protection without slowing down your computer. The completely redesigned new version offers significantly improved performance while providing enhanced protection against viruses, spyware, spam, and phishing. Cincinnati Bell Internet Security is made available to all Cincinnati Bell customers that use Cincinnati Bell as their Internet Service Provider.

See Also
How do I install Internet Security?
Do I have to be an Internet subscriber to purchase Cincinnati Bell Internet Security?

The following operating systems are supported with Cincinnati Bell Internet Security Service:

 Operating System   Processor  Edition
Windows 8.1 32-bit
64-bit
all editions
does not support ARM based tablets
Windows 8 32-bit
64-bit
all editions
does not support ARM based tablets
Windows 7 32-bit
64-bit
all editions
Windows Vista 32-bit
64-bit
all editions
Service Pack 2 or newer
Windows XP 32-bit Home, Professional and Media Center editions
Service Pack 3 or newer
Mac OS X 10.9 (Mavericks)
10.8 (Mountain Lion)
10.7 (Lion)
10.6 (Snow Leopard 10.6.8 or later)


Cincinnati Bell Internet Security system requirements are as follows:

Operating System Processor Memory Disk Space
Microsoft Windows 8.1 Intel Pentium 4 1 GB 1.2 GB
Microsoft Windows 8 Intel Pentium 4 1 GB 1.2 GB
Microsoft Windows 7 Intel Pentium 4 1 GB 1.2 GB
Microsoft Windows Vista Intel Pentium 4 1 GB 1.2 GB

Please Note:
Your computer's processor must be an Intel Pentium 4 or equivalent; there must be 1 GB of memory or more available, and 1.2 GB of free disk space available.

An Internet connection is required in order to validate your subscription and receive updates. Javascript must be enabled in the user's browser settings to enable active block pages.

Operating System Processor Memory Disk Space
Microsoft Windows XP Intel Pentium III 512 MB 1.2 GB

Please Note:
Your computer's processor must be an Intel Pentium III 1 GHz or higher; there must be 512 MB of memory or more available, and 1.2 GB of free disk space available.

Internet connection is required in order to validate your subscription and receive updates. Javascript must be enabled in the user's browser settings to enable active block pages.

Operating System Processor Memory Disk Space
Mac OS X Intel 1 GB 250 MB

Please Note:
There must be 1 GB of memory or more available on your computer and 250 MB of free disk space.

Internet connection is required in order to validate your subscription and receive updates.

See Also
How do I install Internet Security?
What operating systems/system requirements are needed for Internet Security?