• Skip to content
  • Skip to footer
  • WEBMAIL
  • SMARTHUB

SRT.COM

  • INTERNET
  • SECURITY
  • PHONE
  • BUSINESS
  • TV

News

COOKING DEMO

Mar 25 2022

COOKING DEMO

Cooking Demo 1 - Download Graphics to View  
African Peanut Soup
This unique creamy soup is made with simple ingredients including peanut butter, tomato paste, and sweet potato.
Cooking Demo 2 - Download Graphics to View  
8 Healthy Salads
Looking for lunch or dinner ideas? Check out recipes for Avocado and Tuna Salad, Cauliflower Salad, and more.
PrevPreviousINSTAGRAM FOCUS
NextCUSTOMER ALERTNext

INSTAGRAM FOCUS

Mar 21 2022

INSTAGRAM FOCUS

Lord of the Dance Lord of the Dance Lord of the Dance  
Lord of the Dance
Since March includes St. Patrick’s Day, it seems fitting to enjoy a performance by the world’s greatest Irish dancers.
Doggone Adorable Doggone Adorable Doggone Adorable  
Doggone Adorable
Do you follow Instagram on Instagram? It’s well worth it to see their beyond-cute videos like this #WeeklyFluff post.
PrevPreviousCRAFTY DIY
NextCOOKING DEMONext

CRAFTY DIY

Mar 18 2022

CRAFTY DIY

Do-It-Yourself Demo 1 - Download Graphics to View  
Paint an Outdoor Table
Follow along step by step as a thrifter transforms an outdoor table using several coats of paint and a floral stencil.
Do-It-Yourself - Download Graphics to View  
Remove Carpet Stains
Watch this video so you’ll be prepared the next time you get ink, grease, nail polish, wine, or coffee on your carpet.
PrevPreviousTUTORIAL / FAQ
NextINSTAGRAM FOCUSNext

TUTORIAL / FAQ

Mar 15 2022

TUTORIAL / FAQ

Download Graphics to View Question: How can I tell if my identity has been stolen?

Answer: Fortunately, there are clear signs of identity theft, depending on how thieves use your stolen information. The FTC shared these scenarios to help consumers:

An identity thief could use your information to get credit or service in your name.
  • How to spot it: Get your free credit report at AnnualCreditReport.com. Review it for accounts you didn’t open or inquiries you don’t recognize. A new credit card, a personal loan, or a car loan will appear as a new account. A new cell phone plan or utility service — like water, gas, or electric — will show up as an inquiry.
An identity thief could use your credit card or take money out of your bank account.
  • How to spot it: Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make.
  • Bonus advice: Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.
An identity thief could steal your tax refund or use your Social Security number to work.
  • How to spot it: A notice from the IRS that there’s more than one tax return filed in your name could be a sign of tax identity theft. So could a notice that you have income from an employer you don’t work for.
An identity thief could use your health insurance to get medical care.
  • How to spot it: Review your medical bills and Explanation of Benefits statements for services you didn’t get. They could be a sign of medical identity theft.
An identity thief could use your information to file a claim for unemployment benefits.
  • How to spot it: A notice from your state unemployment office or employer about unemployment benefits that you didn’t apply for could be a sign of fraud.
If you discover any signs that someone is misusing your personal information, find out what to do at IdentityTheft.gov.
PrevPreviousTutorial/FAQ
NextCRAFTY DIYNext

Tutorial/FAQ

Mar 12 2022

Tutorial/FAQ

Download Graphics to View Question: QR codes are everywhere. What security steps should I take before scanning?

Answer: QR codes have become more common during the pandemic, as coronavirus concerns triggered a demand for touchless transactions. For example, your server at a restaurant may ask you to scan a QR code instead of handing you a menu. Or you may see QR codes on product packaging at retail stores.

While many QR codes are trustworthy, fraudulent ones are out there. Scammers can use QR codes for malware and phishing attacks or to try and steal financial information. Just as you should never click on suspicious hyperlinks or download fishy email attachments — especially anything sent by strangers — you should avoid suspicious QR codes.

Take these precautions:
  • Use QR scanners that display site URLs. Most third-party QR scanners directly display the website after scanning the code, which can be dangerous if the link is malicious. It’s best to use built-in QR scanners that come within smartphone cameras. These scanners display the site URL before opening it, allowing you to close the link before it opens if it seems suspicious.

  • Regularly update your device’s security. Installing and regularly updating your device’s security software patches can help maintain security. It’s also important to use robust anti-malware software.

  • Remain vigilant. If you see a QR code in a public place, such as on a poster in a mall, closely inspect it to see if it’s a sticker placed over the original QR code.
Finally, if you find a malicious QR code, tell the owner or manager of the business where you discovered it.
PrevPreviousMarch Tech Tip: Managing Your Screen Time
NextTUTORIAL / FAQNext
  • « Previous Page
  • Page 1
  • …
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • Page 52
  • …
  • Page 114
  • Next Page »

Footer

Tools and More
HELP & SUPPORT
SPEED TEST
ONLINE DIRECTORY
PAYMENT OPTIONS
LIFELINE PROGRAM

SRT
ABOUT US
SRT CARES
NEWS
JOIN OUR TEAM
LEGAL


701.858.1200
FOLLOW US:
SRT Facebook  SRT LinkedIn  SRT Twitter  SRT Instagram
SRT YouTube

Generic filters
Exact matches only

This institution is an equal opportunity provider and employer. @2025 SRT Communications, Inc. All Rights Reserved.

S R TLogo Header Menu
  • WEBMAIL
  • SMARTHUB
  • INTERNET
  • SECURITY
  • TV
  • PHONE
  • BUSINESS