The problem @stu593 is, we as customers, have no way to tell what we are doing works until we get another email from Rogers. What one tech told me today was, when you call in, you have to ask for the timestamp of the scan that generated the email -- because the scan could have happened before we apply this "possible" solutions.
Rogers needs to give the customers more specific information if we are to resolve the issue -- especially if we scan the ports and see that they are closed. So, what is Rogers complaining about then?
I THINK THAT I HAVE A SOLUTION … MAYBE
CAVEAT: I will know if this actually worked or not within the next couple of weeks - assuming that “not hearing” anything from Rogers by that time means that I ”passed" their network security test.
My process - basically is a system of elimination with testing of all my devices (16) individually for port problems. There were several surprises in this voyage of discovery. Here is my process, which I have replicated here for those of you interested. Note: Some of you are quite advanced and will likely find this too detailed, but several people are not that familiar with some for these processes and I wanted to provide a bit of helpful guidance. I certainly found several problems which I managed to correct along the way and which have given me complete stealth (at least on the ShieldsUP site) on the most common ports of 1 to 1055 (ShieldsUP explains why they add some extra ports to come up with this number).
I basically spent 3 days full-time this week researching, learning and applying some of the stuff I learnt. There are a lot of opinions out there and I quickly learnt that just because someone had a strong and well-articulated opinion that it didn’t mean that they really knew what they were talking about - they might know some things very well but it was too narrow in scope, or they were too techie and couldn’t be bothered to better explain their expert advice. I can understand the latter point of view (“RTFM you lazy person”) but they weren’t nearly as helpful as they assumed they would be, IMHO.
The home consumer router business is a mess IMHO - while searching for a new router, I was quite interested in security this time around, as opposed to speed and other interesting functions. I narrowed down my choices to about 4-5 routers but while reading reviews, and now being a bit more knowledgeable about routers and security, I realized that consumers really do trust the router providers to offer users with at least a minimally safe setup. To the contrary, this is not the case and I was disheartened to see so many routers with default settings that were wrong, or had not been activated by default, or lacked security features that were essential in this online environment which so much now resembles a “digital war age”. In other words, some routers were being sold to trusting consumers who, if they weren’t so inclined (and that would include me normally) to learn a bit more about their devices, who expect their routers to be safe. So, in a strange way, Rogers is responsible with its cryptic warnings for pushing me to figure this out on my own and I don’t think that what I learnt will be wasted. I certainly am very far from being an expert, but I now know enough to ask better questions and to watch for certain minimal functions within a router that are essential to online safety.
Lastly, there are some very kind and helpful people out there and to them, even though we have never met, I say thank you for sharing your time, expertise and suggestions.