Comcast Secures Subs' Mobile Devices

BTR_Feature_Art_Data_3_19_13As the number of people using mobile devices for sensitive banking or e-commerce transactions increases, it follows that mobile security threats are on the rise. According to Symantec, the instances actually doubled between 2010 and 2011. At the same time, 35% of adults worldwide reported loss or theft of their mobile device. With it, they lose a mine of personal data that could be used to steal their identity.

And with how simple tablets/smartphones make shopping and banking, it can be easy for people to forget about security concerns, said Sue Jin Davis, VP of strategic services for Comcast (NASDAQ:CMCSA). "The spontaneous transactions that can happen over mobile devices are making customers less aware of threats. This is a customer awareness issue as well."

Comcast recently launched Constant Guard Mobile to protect Xfinity customers from phishing attempts, identity theft and connecting to fraudulent websites. "We want customers to believe Comcast offers the most secure way to use the Internet," Davis said. "No one else offers these kinds of protection ... if this means customers stay with us longer ... or if a customer comes to us for that ... that is an achievement."

It follows, then, that the company's information campaign about this app aims to educate consumers not only about the security product, but also about safety on the Internet in general. "We believe in self-help and educating the customer," Davis said. "We are putting the tools in their hands and creating awareness ... as part of our (effort) to make our service more meaningful to the customer."

Constant Guard Mobile is designed to mesh with Comcast's PC/Laptop security product. Working in tandem, the two apps will sync financial, email or social networking accounts so the customer does not have to re-input information into favorite sites.

Additional features include automatic and secure entering of login information to prevent fraud, a privacy service that searches the Web for personal information and deletes it, and the completion of payment authorization forms at checkout so credit card information does not have to be stored on sites.

"(Consumers) can literally see which websites are safer than others," Davis added. "When they are searching on a particular subject, they can see a designation that the site is safe."

Monta Monaco Hernon is a free-lance writer. She can be reached at mcmhern@yahoo.com.

Easily post a comment below using your Linkedin, Twitter, Google or Facebook account.

Related Articles

Merger Mania

AT&T + DirecTV = AT&TV?

May 28, 2014 Even as Comcast's (NASDAQ:CMCSA) pending acquisition of T...
WiFi and SMBs

Small Biz Needs WiFi - and Ops' Help

May 21, 2014 One of the entrepreneurial traditions of cable operators ...
Hot hot hotspots

WiFi Hotspots Heating Up

May 21, 2014 MSO news of WiFi hotspots has gotten, well, really hot of...

BTR Blogs

Mark Johnson, Alticast

Guest Blog: RDK Application Framework Considerations

June 18, 2014 Cable operator enthusiasm for the Reference Design Kit (RDK) is growing ...
Tim Hermes, BTR Founder and Publisher

I'm a Believer

June 11, 2014 I guess it was 3D that made me sketchy. 3D's quiet fade-to-black was not...
Carl Weinschenk

Two Things You Can Get in Kansas City: Super Steaks and Super Broadband

May 28, 2014 Google is picking its spots: It is highly unlikely that the company real...

White Papers & Special Reports

HEVC: New Tools, New Challenges

June 2014 High Efficiency Video Coding (HEVC) is the next step in video compression. Ca...

Managing the challenges of UHF leakage and interference to LTE

June 2014 For decades cable operators have managed signal leakage by monitoring in or n...

Traveling Money: Upgrade Field Force and Fleet Management

May 2014 It is technically possible to separate field force and fleet management: One ...

Sponsored Video

"Click to view the LTE Express"

CONNECT WITH US

Webcasts

There is no current content available.

Featured Hangout

Leakage, Ingress and Interference in Digital Cable Networks

March 13, 2014

Join us for BTR’s fourth Google Hangout – this time on UHF leakage and LTE interference – with Nick Segura (Charter) and Ron Hranac (Cisco).
Sponsored by Trilithic.