FAQs

All Penny Appeal USA-owned devices have been equipped with Webroot Antivirus to ensure comprehensive protection against malware, phishing, and other cybersecurity threats.

What does Webroot Antivirus protect me from?

Webroot Antivirus provides comprehensive protection against:

  • Malware and Viruses: Detects and removes malicious software in real-time.
  • Ransomware: Blocks unauthorized attempts to encrypt your files.
  • Phishing Attacks: Prevents access to fake websites designed to steal your information.
  • Spyware: Protects your data from being accessed or tracked without your consent.

Security Features

2. How does Webroot Antivirus ensure my device’s safety?

  • Real-Time Threat Detection: Monitors your device continuously to detect and neutralize threats as they arise.
  • Behavioral Analysis: Identifies unusual activities that might indicate malicious behavior, even from unknown threats.
  • Web Filtering: Blocks access to dangerous websites known for hosting malware or phishing schemes.
  • Firewall Protection: Enhances your system’s built-in firewall for advanced defense against network-based attacks.
  • Identity Shield: Prevents keylogging, screen capturing, and other methods used to steal sensitive information.

3. How does Webroot prevent phishing and fraud?

  • URL Scanning: Analyzes links in emails, messages, and websites in real-time to identify malicious URLs.
  • Credential Protection: Stops fake websites from collecting your login details and financial information.

4. Does Webroot protect my files from ransomware?

Yes, Webroot includes:

  • Ransomware Rollback: Detects and reverses unauthorized file encryption attempts.
  • File Shielding: Protects critical files and folders from being altered by malicious programs.

5. How does Webroot protect me while browsing online?

Webroot’s Web Shield integrates with your browser to provide:

  • Warnings for risky websites.
  • Safe search results, clearly marking secure links.
  • Automatic blocking of malicious pop-ups and downloads.

6. Can Webroot monitor and protect all my devices?

Yes, Webroot provides multi-device coverage, including:

  • Windows PCs and Laptops: Advanced protection for all your files and programs.
  • Macs: Real-time scanning and web filtering for enhanced security.
  • Mobile Devices: Anti-theft tools for Android and web protection for iOS.

Proactive Features

7. How does Webroot minimize the impact on my device performance?

  • Cloud-Based Protection: Performs most security processes in the cloud, reducing strain on your device.
  • Lightweight Design: Scans files quickly without using significant system resources.

8. What happens if Webroot detects a threat?

  • The threat is immediately quarantined to prevent harm.
  • A detailed report is generated for your review.
  • You can either delete the threat permanently or restore it if it’s a false positive.

Training and Security Awareness

9. How does Webroot Security Awareness Training help?

Our training program empowers users to:

  • Identify phishing emails and fake websites.
  • Understand secure password practices.
  • Learn how to avoid common cybersecurity mistakes.

10. What does the Webroot training include?

  • Simulated Phishing Tests: Helps you practice recognizing phishing attempts in a safe environment.
  • Interactive Modules: Short, engaging lessons on topics like data protection, compliance, and best practices.
  • Regular Updates: Keeps you informed about evolving threats and cybersecurity trends.

Device Management and Reporting

11. How can I ensure all my devices are protected?

  • Webroot is already installed on your devices and configured to provide continuous protection.
  • Use the Webroot Management Console to monitor the status of all protected devices.

12. Can I see a report of Webroot’s activity?

Yes, Webroot generates:

  • Weekly and monthly reports summarizing threats blocked and security updates applied.
  • Alerts for high-priority issues needing immediate attention.

13. What happens during a scheduled scan?

  • Webroot checks your system for threats, including new files and updates.
  • Any suspicious activity is flagged for further review.

Customer Support

14. What should I do if I suspect a security issue?

  • Webroot automatically detects and addresses most threats.
  • If you notice unusual behavior on your device, contact our support team for assistance.

15. How do I contact Webroot support?

  • Use the Support Portal for troubleshooting guides and FAQs.
  • Reach out to your administrator or IT team for immediate assistance.

Advanced Security Features We Provide

16. How does Webroot integrate with my organization’s security framework?

We enhance your security by:

  • Centralized Management: All devices are monitored and updated automatically.
  • Regular Threat Assessments: Your system is continuously evaluated for vulnerabilities.
  • Data Backup Integration: Ensuring your critical files are recoverable in case of a cyberattack.

17. What additional features does Webroot provide for business users?

  • DNS Protection: Filters unwanted or dangerous web traffic at the network level.
  • Dark Web Monitoring: Alerts if sensitive credentials are exposed online.
  • Policy Enforcement: Ensures consistent security settings across all devices.

Training Best Practices

18. How often should I complete Webroot training?

It’s recommended to complete training modules quarterly to stay updated on the latest cybersecurity threats and best practices.

19. How do I access training modules?

  1. You’ll receive an email invitation to the Webroot Training platform.
  2. Log in using the credentials provided.
  3. Complete the assigned courses and assessments at your own pace.

20. How do phishing simulations work?

  • Our team sends simulated phishing emails to test your ability to identify scams.
  • Feedback is provided after each test, highlighting what to look out for in real attacks.

Why Trust Webroot for Your Security?

With Webroot Antivirus installed on your devices and our training program in place, you’re equipped with proactive defenses and the knowledge to stay secure in an evolving digital landscape. For questions or assistance, contact your IT support team.


Was this article helpful?