User's Manual

Internet and online security - 80
Select Acer computers include protection by Norton Security
1RUWRQ6HFXULW\ LV SUHLQVWDOOHGRQVHOHFW $FHUFRPSXWHUVSURWHFWLQJ
\RXU LGHQWLW\ DQG ILQDQFLDO GDWD IURP YLUXVHV VS\ZDUH PDOZDUHDQG
RWKHU RQOLQH WKUHDWV /HDUQ PRUH DERXW KRZ WR VWD\ VDIH RQOLQH DQG
KRZWRVWD\SURWHFWHGDIWHU\RXULQWURGXFWRU\VXEVFULSWLRQHQGV
Staying ahead of cybercriminals
6WD\ DKHDG RI KDFNHUV DQG F\EHUFULPLQDOV E\ XQGHUVWDQGLQJ WKH
WDFWLFVWKH\XVHWRDFFHVV\RXUSULYDWHGDWD
Ensure your software is up to date
&\EHUFULPLQDOV UHO\ KHDYLO\ XSRQ VRIWZDUH RU SODWIRUP YXOQHUDELOLWLHV
DV WKH\ DUH WKH HDVLHVW ZD\ WR VQHDN PDOZDUH LQWR D XVHUV GHYLFH
XQQRWLFHGVRPHWLPHVZLWKOLWWOHDFWLRQRQWKHXVHUVSDUW,PPHGLDWHO\
DIWHU D VRIWZDUH PDQXIDFWXUHU DQQRXQFHV DQ XSGDWH KDFNHUV DUH
UHDG\ZLWKPDOZDUHWKDWFDQEUHDFKKROHVLQWKHVRIWZDUHWKDWZRXOG
KDYHEHHQSDWFKHGLIWKHXSGDWHZDVLQVWDOOHG
+RZWRVWD\VDIH3HUIRUPDQ\DQGDOOVRIWZDUHXSGDWHVDVVRRQDV
WKH\DUHDYDLODEOH
Keep a lookout for fake or phishing emails
%HZDUH RI HPDLOV WKDW DSSHDU WR EH IURP D IULHQG RU EXVLQHVV
FROOHDJXH WKDW \RX NQRZ EXW VHHP D OLWWOH RGG 0D\EH WKH\ GLGQW
FDSLWDOL]H \RXU QDPH RU WKHUH DUH PLVVSHOOLQJV 7KH HPDLO PLJKWEH
IURPF\EHUFULPLQDOVZKRDUHWU\LQJWRIRRO\RXLQWRVHQGLQJWKHP\RXU
FUHGLW FDUG QXPEHU VRFLDO VHFXULW\ QXPEHU RU ORJJLQJ LQWR D IDNH
EDQNZHEVLWHWKDWORRNVOLNH\RXUVEXWUHDOO\LVQW
+RZ WR VWD\ VDIH 8VH D VWURQJ DQWLVSDP ILOWHU ,I DQ HPDLO ORRNV
VWUDQJH GRQW FOLFN RQ DQ\WKLQJ DQG GHOHWH LW LPPHGLDWHO\ ,QVWHDG
PDQXDOO\ODXQFK DEURZVHUDQG W\SH LQ\RXUEDQNVZHEVLWH DGGUHVV
DQGORJLQ\RXUVHOI
Don't be fooled if someone calls your phone
$WHFKVXSSRUWVFDPLVDIRUPRIRQOLQHIUDXGZKHUHSHRSOHFDOO\RX
RQ WKH SKRQH VD\LQJ WKH\UH 7HFKQLFDO 6XSSRUW IURP D WUXVWHG
1RWH
Specifications vary depending on model or Operating System.