User's Manual
Internet and online security - 80
Select Acer computers include protection by Norton Security
1RUWRQ6HFXULW\ LV SUHLQVWDOOHGRQVHOHFW $FHUFRPSXWHUVSURWHFWLQJ
\RXU LGHQWLW\ DQG ILQDQFLDO GDWD IURP YLUXVHV VS\ZDUH PDOZDUHDQG
RWKHU RQOLQH WKUHDWV /HDUQ PRUH DERXW KRZ WR VWD\ VDIH RQOLQH DQG
KRZWRVWD\SURWHFWHGDIWHU\RXULQWURGXFWRU\VXEVFULSWLRQHQGV
Staying ahead of cybercriminals
6WD\ DKHDG RI KDFNHUV DQG F\EHUFULPLQDOV E\ XQGHUVWDQGLQJ WKH
WDFWLFVWKH\XVHWRDFFHVV\RXUSULYDWHGDWD
Ensure your software is up to date
&\EHUFULPLQDOV UHO\ KHDYLO\ XSRQ VRIWZDUH RU SODWIRUP YXOQHUDELOLWLHV
DV WKH\ DUH WKH HDVLHVW ZD\ WR VQHDN PDOZDUH LQWR D XVHUV GHYLFH
XQQRWLFHGVRPHWLPHVZLWKOLWWOHDFWLRQRQWKHXVHUVSDUW,PPHGLDWHO\
DIWHU D VRIWZDUH PDQXIDFWXUHU DQQRXQFHV DQ XSGDWH KDFNHUV DUH
UHDG\ZLWKPDOZDUHWKDWFDQEUHDFKKROHVLQWKHVRIWZDUHWKDWZRXOG
KDYHEHHQSDWFKHGLIWKHXSGDWHZDVLQVWDOOHG
+RZWRVWD\VDIH3HUIRUPDQ\DQGDOOVRIWZDUHXSGDWHVDVVRRQDV
WKH\DUHDYDLODEOH
Keep a lookout for fake or phishing emails
%HZDUH RI HPDLOV WKDW DSSHDU WR EH IURP D IULHQG RU EXVLQHVV
FROOHDJXH WKDW \RX NQRZ EXW VHHP D OLWWOH RGG 0D\EH WKH\ GLGQW
FDSLWDOL]H \RXU QDPH RU WKHUH DUH PLVVSHOOLQJV 7KH HPDLO PLJKWEH
IURPF\EHUFULPLQDOVZKRDUHWU\LQJWRIRRO\RXLQWRVHQGLQJWKHP\RXU
FUHGLW FDUG QXPEHU VRFLDO VHFXULW\ QXPEHU RU ORJJLQJ LQWR D IDNH
EDQNZHEVLWHWKDWORRNVOLNH\RXUVEXWUHDOO\LVQW
+RZ WR VWD\ VDIH 8VH D VWURQJ DQWLVSDP ILOWHU ,I DQ HPDLO ORRNV
VWUDQJH GRQW FOLFN RQ DQ\WKLQJ DQG GHOHWH LW LPPHGLDWHO\ ,QVWHDG
PDQXDOO\ODXQFK DEURZVHUDQG W\SH LQ\RXUEDQNVZHEVLWH DGGUHVV
DQGORJLQ\RXUVHOI
Don't be fooled if someone calls your phone
$WHFKVXSSRUWVFDPLVDIRUPRIRQOLQHIUDXGZKHUHSHRSOHFDOO\RX
RQ WKH SKRQH VD\LQJ WKH\UH 7HFKQLFDO 6XSSRUW IURP D WUXVWHG
1RWH
Specifications vary depending on model or Operating System.