At PenTeleData, we’re focused on keeping our customers informed.

That’s why we publish a quarterly newsletter, send educational emails and communicate via social media. It is our hope that the advice below will educate our customers about the latest online security concerns and other related topics.

Don’t Test Your Luck: Four Tips to Stay Safe Online

There are some things that a four-leaf clover can’t do, and keeping your personal information safe from those wishing to steal it is one of them. Here are some tips published by the Cybersecurity & Infrastructure Security Agency that will help you spend your time celebrating St. Patrick’s Day instead dealing with identity theft.

Read More

Recognize a Phishing Scam Before You Get Caught

Scammers know the value of your personal and financial information and will do or say almost anything to get it. The best way to avoid this is to recognize a phishing scam.

Often, these scams originate from an unexpected email, text, or call that appears to be from a recognizable company. The sender or caller claims that there’s a problem or some urgent matter that needs immediate attention. You may be asked to click a link or call a number to eliminate a threat or consequence. Your response sets you up for identity theft.

To stay safe from scammers, consider these tips:

Read More

Password Security

Reminder: It’s time to change your passwords. New, strong passwords can prevent bigger headaches later.

Whether you’re banking or shopping online, doing research or social networking, you need account passwords. Unfortunately, the more details you share, the easier it is for cybercriminals to use your information. One way to help keep your personal details safe is to choose strong passwords.

Here’s how:

Read More

Tips for Safe Online Shopping

It’s easy and convenient, but there are a few steps to take when shopping online. The Federal Trade Commission (FTC) published some tips for finding the best deals while shopping as safely as possible. Consider adding these important steps to your “to-do” list. It’s also the perfect time to share them with family since identity theft and scams can affect all generations.

Read More

Take a Proactive Approach to Physical Security

When it comes to cybersecurity, many focus on staying safe from hackers and viruses, but physical security can be just as important.

Physical security means keeping unauthorized people out of your space. In terms of your connected devices, that actual space could include your home, a home office, a hotel room, or anywhere else that you might use them. It also means protecting the information on your devices. You probably already use locks on your doors and may even use a safe or security system, but here are a few other precautions to take:

Read More

What is a Deepfake?

A deepfake is a video or picture created by using computer software that looks almost indistinguishable from the real deal. Deepfakes have several uses, including movie production, but not all deepfake technology is benign. Deepfake pictures or videos can be used to make politicians and other public figures do or say anything, spreading falsehoods, destroying a company’s reputation, interfering with elections, and altering public health initiatives. In your personal life, hackers can scrape your social media accounts and create a realistic deepfake of you.

Read More

What is Multifactor Authentication Bypass?

Multifactor Authentication (MFA) is an added layer of protection for online accounts. MFA is used to protect sensitive data. When MFA is enabled, users must complete both authentication factors to gain access. 

Read More

What is Vishing?

Vishing is short for “voice phishing,” a type of cyberattack that uses calls or voice messages designed to trick victims into providing sensitive information, such as financial or login credentials. These details can then be used for criminal activities such as fraud, identity theft, or financial theft. Callers pretend to be from a reputable organization or authority with a story you’re likely to believe.

Read More

Watch Our for Elder Fraud and Other Scams

Do you know a widow or long time divorcee whose boyfriend works in the middle of the ocean on an oil rig? There’s an unfortunate good chance that you do. Elder fraud is common and there are many methods to swindle money from unsuspecting seniors, who tend to be targets because they are often trusting and polite. They are also less likely to report fraud due to shame, embarrassment, or not knowing who to contact.

Read More

How to Avoid Spam

Nearly everyone who has an e-mail address they regularly use has run into at least a small problem with spam.  What is spam?  Spam is bulk, unsolicited e-mail—most often, it’s trying to sell you something, and sometimes it’s trying to convince you to relinquish your credit card information, bank account information, and any other personal information you’re willing to give.

Read More

The Internet of Things and Personal Privacy in a Hyper-Connected World

Every company has a product.  For home improvement stores, it’s building materials and tools.  Book stores sell books.  Coffee shops sell coffee.   PenTeleData’s product is the Internet.  Our partners’ products are phone, cable, Internet, and security systems.  All of these are pretty straight-forward.  What about Google, Facebook and other social media and content providers?  Their product is YOU!

Read More

Know the Basics about Social Engineering

Ring Ring! 

“Hello, how are you?  I am James and I am calling to tell you about a problem with your computer.  You are not receiving Microsoft updates.”

Or maybe: “Good morning, this is Mr. Doe with your telephone company (or electric, water, or any other service provider).  We’ve noticed a problem with your service and need to ask you a few questions to verify your identity so that we can resolve it.”

Read More

How to Properly Dispose of Electronic Devices

We all have them.  Whether it’s a laptop computer, a desktop computer, a tablet, a cellular phone or any other device, it’s important to know how to dispose of them properly when the time comes.  It’s more than just an environmental issue, because these electronics can also hold (and potentially disclose) sensitive information about us.  Computers, smartphones, gaming consoles, external hardware, digital media, and cameras allow you to keep a great deal of information at your fingertips, but when you dispose of, donate, or recycle a device you may inadvertently disclose sensi

Read More

Social Media and Privacy Concerns

Facebook, Twitter, Instagram, Snapchat…they’re all very popular.  After all, it’s sometimes fun to see everyone’s pictures, opinions, activities, and more.  It can even great for keeping in touch with extended family or old high school friends.  Still, it’s a double edged sword, so there are a few factors to keep in mind regarding privacy and safety.

Read More

Residential Billing

Terms and Conditions

It is advisable to be familiar with PenTeleData 's billing rules in order to prevent billing disputes. The sooner a billing dispute is brought to our attention, the easier it will be to resolve to everyone's satisfaction. We are unaware of a problem unless it is brought to our attention by either calling the Billing Department at 1-800-281-3564 or emailing to billingd@corp.ptd.net

Age Limitation: A customer must be a minimum of 18 years of age in order to subscribe to PenTeleData service.

Read More

Residential Policies

 

PenTeleData Internet Access Acceptable Usage Policy

PenTeleData powers high speed broadband cable modem and DSL services for our partners. This Acceptable Use Policy (AUP) applies to both services and which are collectively referred to in this document as "PenTeleData." All Users of PenTeleData, hereby agree to the following terms of this AUP. If you are not in agreement with these terms, please immediately contact PenTeleData via email at custserv@corp.ptd.net.

Read More

What is Malware?

Removing malware can be difficult. Preventing it from happening is much easier.

Malware, short for malicious software, is used to describe any software that was created with bad-natured intent. Some malware is intrusive and cause serious problems with your computer. Other malware can secretly steal information and send it to the designer.

There are many types of malware. Some of these include viruses, network worms, Trojans, spyware and rootkits.

How does malware spread?

Read More

What is Password Security?

Whether you're banking or shopping online, doing research or social networking, you need account passwords. Unfortunately, the more details you share, the easier it is for cybercriminals to use your information. One way to help keep your personal details safe is to choose strong passwords.

Here's how:

Do not use personal information in your password.

Read More

What is Online Privacy?

Have you used a grocery store card or savings card today? Have you used a key word to search for something on the Internet? If so, then your data is probably being used by someone for tracking or marketing purposes.

Read More