NEW ENHANCED FEATURES
Your Home Network Security,
Your Way
Defend & secure your home and block cybercriminals with
SecureNet Home’s new personalised network protection features.
Defend & secure your home and block cybercriminals with SecureNet Home’s new personalized network protection features.
Experience a New Level of Online Safety At Home for Everyone
Whether it’s your kids browsing the web, grandparents catching up on emails, or you working remotely, everyone in the family can enjoy a secure and personalised browsing experience with
SecureNet’s tailored protection features.
Shield Your Loved Ones From Cyber Threats
Guard Your Sensitive Data
Keep Your Devices Healthy
Set Personalised Controls for At-Home Browsing
With SecureNet Home’s enhanced features, you can easily customise your protection with Network Security, Ad Block, and Child Protect capabilities. Gain more control over your network and keep it safe for every user and all connected devices, no matter what they do online.
FEATURE | Network Security | Child Protect | Ad Block | |
Standard | Enhanced | |||
Safe For | Casual Daily Use | Work From Home Use | Children & Elderly | Browsing |
Defends Against | Viruses, Malware, Spyware | Dangerous And Inappropriate Websites | Pesky And Dangerous Web Static Ads. Video Ads Might Not Be Blocked. | |
Protects Against | Critical System Vulnerabilities | All System Vulnerabilities | ||
Restricts |
Child Safe Web Filtering Categories The following table lists predefined web categories that SecureNet Home blocks to protect children and elderly while browsing the web. |
|
Abused-Drugs | Sites that promote the abuse of both legal and illegal drugs, the use and sale of drug-related paraphernalia, or the manufacturing or selling of drugs. |
Adult | Sites with any sexually explicit material, media (including language, games, or comics), art, or products, online groups or forums that are sexually explicit in nature, and sites that promote adult services, such as video or telephone conferencing, escort services, and strip clubs. |
Command-And-Control | Command-and-control (C2) URLs and domains used by malware or compromised systems to surreptitiously communicate with an attacker's remote server to receive malicious commands or exfiltrate data. |
Extremism | Sites promoting terrorism, racism, fascism, or other views that discriminate against people or groups of different ethnic backgrounds, religions, and other beliefs. In some regions, laws and regulations may prohibit allowing access to extremist sites, and allowing access may pose a liability risk. |
Gambling | Sites that facilitate the exchange of real or virtual money through lotteries or gambling. Includes related sites that provide information, tutorials, or advice on gambling, such as how to bet odds and pools. |
Grayware | Sites with content that don't pose a direct security threat but that display other intrusive behavior and tempt end users to grant remote access or perform other unauthorised actions. |
Malware | Sites containing or known to host malicious content, executables, scripts, viruses, trojans, and code. |
Newly-Registered-Domain | Sites that have been registered within the last 32 days. Newly registered domains are often generated purposely or by domain generation algorithms and can be used for malicious activity. |
Phishing | Web content that covertly attempts to harvest information, such as login credentials, credit card information, account numbers, PINs, and other personally identifiable information (PII), voluntarily or involuntarily, from victims using social engineering techniques. Includes technical support scams and scareware. |
Questionable | Sites containing tasteless humor or offensive content targeting specific demographics of individuals or groups of people. |
Ransomware | Sites known to host ransomware or malicious traffic involved in conducting ransomware campaigns that generally threaten to publish private data or keep access to specific data or systems blocked, usually by encrypting it, until the demanded ransom is paid. Includes URLs that deliver related stealers, wipers, and loaders that may carry ransomware payloads. |
Weapons | Sites that handle sales or offer reviews, descriptions of, or instructions regarding weapons, armor, bulletproof vests, and their use. |
Alcohol-And-Tobacco | Sites that pertain to the sale, manufacturing, or use of alcohol or tobacco products, and related paraphernalia. Includes sites related to electronic cigarettes. |
Dating | Sites offering online dating services, advice, or other personal ads. |
Nudity | Sites that contain nude or seminude depictions of the human body, regardless of context or intent, such as artwork. Includes nudist or naturist sites containing images of participants. |
Peer-To-Peer | Sites that provide access to or clients for peer-to-peer sharing of torrents, download programs, media files, or other software applications. Primarily applicable to those sites with BitTorrent download capabilities. Excludes shareware or freeware sites. |
Proxy-Avoidance-And-Anonymizers | Proxy servers and other methods that bypass URL filtering or monitoring. |
A Tried and Trusted Solution
SecureNet protects our customers from millions of cyber threats each year.
Here’s how we did for the whole of 2023:
Threat | What It Is | Crises Averted |
---|---|---|
Spyware | Malicious software planted in a computer. Attackers can use spyware to access an internet user's private data and online activities, which they can then misappropriate or misuse. | 9,635,675Spyware Prevented |
System Vulnerabilities | Weaknesses on computer networks that cyber criminals use to gain access and run malicious code, install malware, or even steal sensitive data. | 7,173,729 System Vulnerabilities Prevented |
Scan Attacks | Attackers secretly probe a network to find and exploit weaknesses. | 17,662,853 Scan Attacks Prevented |
Cryptominer | Attackers compromise and exploit a network to generate crypto-currencies using your hardware. Victims pay for the electricity consumption, and attackers use their machine for monetary gain. | 2,804,772 Cryptominer Attacks Prevented |
Info Leaks | Attackers use software vulnerabilities to access and collect sensitive data about an internet user. Often, info leaks arise from a lack of comprehensive network checks. | 3,030,982 Info Leaks Prevented |
Botnet | Hackers use bots to infect computers and execute security violations, such as deleting data or installing adware. | 7,381,057 Botnet Attacks Prevented |
ELF | Executable and Link Format (ELF) is an executable file format for the Linux and Unix platforms that may contain malware. | 11,264 ELF Attacks Prevented |
Interested in SecureNet Home?
Get Free 3 Months SecureNet at Home with your new Home Broadband Plan today.
Whether you’re a seasoned marathoner or a first-time runner, this is your chance to challenge yourself, celebrate every stride, and win prizes.
There’s $20,000 in cash prizes waiting for you!