CenturyLink takes your internet safety seriously. We offer security software from McAfee, included at no extra charge for all residential High-Speed Internet customers. You can also protect yourself with good judgment and general education about:
How many passwords do you have? Are they all different? A secure password helps to protect your information. These tips will help you create and manage more secure passwords.
Common types of passwords
||The PPP username/password is what the modem presents to your ISP to gain access to the internet. This information is automatically programmed into your CenturyLink supported modem during the initial setup. If the automated process fails, or you are using a non-standard equipment, you may need the PPP username/password to program your equipment manually. If you have an ISP other than CenturyLink, contact them for details on connecting to the internet.||Chat with tech support
The modem's admin username/password is used to restrict access to your modem settings. The modem GUI (located at http://192.168.0.1) gives you access to utilities, tools, and settings like wireless, port forwarding, firewall, and more.
||The wireless username/password (a.k.a. SSID or passphrase) on your modem is used to restrict access to your modem's ability to provide a wireless internet connection.
|An email password is used to restrict access to your email.
||My CenturyLink is your online account access to view and pay your bill and make changes to your CenturyLink account and features.
The Federal Communications Commission (FCC) provides these recommendations on creating secure passwords:
Learn more about securing your computer, network, and security software.
Make sure your device's operating system, browser, plug-ins, and programs are up-to-date. Here are some tips:
CenturyLink takes your internet safety seriously. We offer security software at no extra charge to our residential internet customers. Some customers also have Secure WiFi, providing security for the entire home network directly from the modem.
Wireless networks can be vulnerable to hackers or malicious software (such as worms). Wireless networks use radio waves that can go beyond the boundaries of your home or business. If you don't secure your network, people with computers nearby may be able to access information on your computers and use your internet connection to perform illegal activities. Set up a custom security key on your wireless network (WPA is recomended), to help protect it from unauthorized access.
Internet users are constantly being offered free software. Remember that behind every website or email campaign is a real individual or business attempting to generate revenue. Be cautious when considering installing “free software.”
Legitimate software can be modified to house malware and made available for download on third party sites. The safest way to obtain software is to download it directly from the manufacturer.
Downloading trial software
Sometimes companies offer "trial software" or beta versions of the software that may expire after a set time or be limited in functionality. Some of this is legitimate, but some will deliver malware or extra items that the user did not agree to. Do research on the software package online to see what others who have tried it are saying about it. There are many online sites where users report malicious software packages.
In additon to keeping your email account secure with a strong password, stay aware of common email scams such as:
Learn more tips for email security.
Open relays and proxies
An open mail relay is a setting email servers use to allow anyone to send email through it.
How do I test an IP address for an open relay? Use the search term "SMTP open relay test" to find a 3rd party tool to test for open relay.
How do I report an open relay? Search for "how to report open relay" to find a 3rd party tool to open relays.
How do I fix an open relay? If you need a network or system security advice, you should hire a competent accredited security consultant. If you feel comfortable troubleshooting on your own, search for "securing systems against spam" or "how to secure your email system against third-party relay".
Was this page helpful?