Responsibility

Making things better for our customers

We're making things better for our customers by building a more sustainable business. We are positively impacting our communities, our environment and our world, by being a good corporate citizen. Operating a responsible business is at the heart of what we do.

2017 Corporate Social Responsibility Report

We strive to create a brilliant digital future for Canadians. That means providing products and services that are simple, easy to use and worry-free, so that our customers can go about their daily lives. It’s also about the way we do business. People want to work with a company they feel is ethical and transparent, and that means we consider the societal, economic and environmental benefits and costs in everything we do.

Back

Cyber Security

Cyber Security at Rogers

The online world is constantly evolving. With every new platform, app or social media site, the possibilities for a rich, connected experience grow. But there are online risks, too. At Rogers, we encourage our customers to always be aware of cyber safety. Whether it is phishing, attempted identity theft, or other threats, we take cyber security very seriously and want to help protect our customers. The good news is that by taking a few small security steps, customers can enjoy all the internet has to offer, while staying cyber safe!

Remember, Rogers will never ask you to send us your personal or account information via email or text message. You can forward suspicious emails to abuse@rogers.com and suspicious texts to 7726 (SPAM).

Online Shopping – Cyber Safety Tips

Tips to Keep Safe from Phishing Email Scams

Keeping Kids Safe and Secure Online

Glossary

Cookie: A file placed on your computer by a website to enable the website to remember your details and track your visits.
Cyber Attack: A form of cyber war, whether combined with a physical attack or not, which is intended to disrupt an adversary's information dependent systems.

Cyberbullying: Bullying or harassment that takes place online; includes posting embarrassing pictures or unkind comments on a person's profile or sending them via instant message or email. Thus often takes the form of threats and intimidation against the victim.
Identity Theft: The crime of impersonating someone and using their private information, usually for financial gain.
Malware: Malicious software designed to infiltrate or damage a computer system, without the owner's consent.  Common forms of malware include computer viruses, worms, Trojans, spyware, and adware.
Phishing: An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand, usually for financial gain.  Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts.
Ransomware: Software that denies you access to your files until you pay a ransom.
Smishing: Fraudulent SMS messages designed to induce users to reveal personal or financial information via the mobile phone
Spear Phishing: The use of spook emails to persuade people within an organization to reveal their usernames or passwords. Unlike phishing, which involves mass mailing, spear phishing is small-scale and well targeted.
Spyware: Software that enables advertisers or hackers to gather information without the user's permission.  Spyware programs are not viruses, since they do not spread to other computers, but they can have undesirable effects.  Once installed, spyware tracks the infected computer's activity and reports it to others.  Spyware also consumes memory and processing capacity, which may slow or crash the infected computer.
Virus: A computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user.  Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer.
Glossary ©2018 Canadian Centre for Cyber Security All rights reserved in favour of Federal Government of Canada.

Subscribe to our mailing list

* indicates required
Email Frequency