Quick Reference
Helpful tips for commonly asked questions.
Billing & Payment Information
Live Your West Life your way as Range offers six easy options to pay your bill.
- SmartHub App
- Automatic Bill Pay
- One-Time Payment
- Pay by Phone – Call Tollfree (855) 965-3715
- Mail – PO Box 506, Worland, WY 82401
- Drop Box – View Locations
Need help paying your bill? Call or stop by any one of our locations
Learn about Affordability Assistance Programs and whether you qualify.
Since Range bills a month in advance, your first statement will be the month following installation. The first statement will show a higher-than-average balance due to installation service costs and the current month plan’s cost. Statements following the first statement will reflect your normal monthly recurring cost
My Account Setup with SmartHub
Manage your account from the convenience of your home computer, mobile phone, or tablet. Using SmartHub, you can check your balance, make payments, set up automatic bill pay, anytime, anywhere.
To create a new account, go to My Account and click on Register for SmartHub. Residential customers will need to have their account number before starting the registration process. Business customers will need to have their company tax ID number. You will be guided through a series of prompts to register your account. After you register, you will receive an email with a temporary password that you can use to log in. Once logged in, you will be prompted to change your password.
Speed & Performance
Check the speed of your current internet service here: Internet Speed Test
Bandwidth cannot be guaranteed due to the dynamic nature of the internet. When a particular speed is ordered, it is programmed for that maximum speed. Range will work with you to ensure that you are receiving as close to your subscribed speed as possible.
Several factors contribute to DSL speeds. The internet is dynamic and bandwidth cannot be guaranteed. However, if it is excessively slow, contact the Helpdesk at (855) 866-4436.
Webmail Basics
You can access your Range Webmail by clicking Webmail on the home page. You will be prompted to enter your username and password.
Range’s webmail system is powered by Zimbra, a secure and private email server. Our full-featured messaging and collaboration application offers reliable email, contact lists, calendaring, task lists and web document authoring services.
With your webmail account, you will be able to send and receive email from any computer or device from anywhere you’re connected to the internet.
Check the Email Filter Folder in your email account. The email may have been tagged as spam. By default, our anti-spam feature is turned on for all users.
Over 95% of viruses are transmitted through email and Range’s virus protection scans all emails. There is no 100% solution to protect against all viruses. Range recommends also having an up-to-date desktop virus and anti-spyware application such as Range’s Client Tools with anti-virus command.
Range Products and Services
Internet
Voice
Range VoIP Business Phone Solution
Managed IT Services
Telephone Assistance
Program (Lifeline)
Internet
Whether you’re streaming, scrolling or just catching up, Range brings you fast, reliable internet speeds up to 1,000 Mbps with no contracts and no hidden costs.
Find out if Range High Speed Internet is available in your area.
Starting as low as $50 per month, Range offers fast, reliable internet at download/upload speeds of up to 1,000 Mbps, keeping you on the grid even if you live off the grid. There are no contracts, no hidden costs and no early termination fees – just a rapid-fast broadband connection that allows you to Live Your West Life, wherever you may roam.
Range’s internet service is across an expansive coverage area spanning over 30,000 square miles across Wyoming, Montana, Colorado, and South Dakota. Download our network map on our website to explore our footprint and check out the Current Projects Map to see if your address is part of a Range expansion project.
Whether at home or work, Range’s comprehensive internet packages keep you connected with no frills, including identical pricing for residential and business internet plans.
For an extra $10 per month with any of our provided residential or business internet plans, Range Ultimate Wi-Fi gives you access to powerful additional services – including ExperienceIQ® and ProtectIQ® through the Range Smart Home app - that offer more protection, more control and more features to help you Live Your West Life your way. Range Ultimate Wi-Fi installation, repair and replacement, remote/on-site support and more is free as part of your experience, and new customers receive their first 3 months of Range Ultimate Wi-Fi free.
With the Range Ultimate Wi-Fi add-on, you get exclusive access to both ExperienceIQ® and ProtectIQ® through the Range Smart Home app to give you a extra layers of control and security throughout your Range plan(s).
- ExperienceIQ® lets you manage screen time, content, access to websites and applications so that you’re always getting the level of connection you want, when you want. With ExperienceIQ®, you’re able to prioritize which devices get preferred connection (such as computers, phones, SmartTVs, gaming systems and more) and create custom internet settings for family members, including preset off times. ExperienceIQ®’s safe search and content filtering tools also can also prevent users from accessing inappropriate and explicit content, helping to keep you and your loved ones safe and secure on the internet. Learn more about ExperienceIQ® today. (Link)
- ProtectIQ® is the ultimate tool to safeguard your network and devices, alerting you when unwanted visitors, hackers, viruses or malware tries to visit. ProtectIQ® has real-time threat protection for all of your connected devices and scans and monitors all network traffic before it reaches you, including for vulnerable devices like SmartTVs and cameras. With regular notifications, ProtectIQ® keeps you in the know right away of any potential digital threat and keeps your information under lock and key. If it’s connected, it’s protected with ProtectIQ® - learn more today. (Link)
Turning something off and on again resets the system state, clears out errors and restores fresh connections, which is often all that’s needed to fix minor glitches. Reboots often force apps and systems to rebuild files properly, fixing errors caused by bad cache, and helps identify the issue as transient or software-related rather than hardware-based. If turning a device on and off again doesn’t work, the issue may be hardware- or configuration-based or be due to external interference, which may require some expert help to fix. Please contact Range if you are having extended issues with Range hardware.
Range Voice Always Clear. Always Connected.
Download Range’s calling features guide for a comprehensive list of abilities that you’re able to use while with a Range voice plan.
Download Range’s calling features guide for a comprehensive list of abilities that you’re able to use while with a Range voice plan.
Absolutely not, you may keep your current telephone number, unless you would like to change it.
Yes, you may keep your current long distance provider, but you may want to see what Range can offer in savings to your monthly long distance bill. Often, low per-minute offers by long distance companies do not reflect your total cost per minute after taxes and fees are added to your monthly long distance bill. Range’s per-minute rates may be higher; however, Range assesses only the fees and taxes required by law, resulting in savings over many other long distance providers.
Accessing your voice mail from line with voice mail service:
- Dial your 3 digit prefix followed by the numbers: 6 2 4 5 or * 9 9
The first time you access your voice mailbox you will be asked to set up your mailbox, change your PIN, and record your name and an optional greeting that will play for your callers. After your mailbox has been set up, the next time you call the access number you will be prompted to key in your PIN unless you specify that you want the system to skip your PIN when you call in from this line.
(For more info see TO CHANGE YOUR PIN or SECURITY OPTIONS)
When you have one or more unheard messages waiting, your dial tone will begin with a stutter and a signal will be sent to your line that may illuminate a message waiting light or display a message waiting screen if your phone is so equipped. Once connected, simply follow the voice prompts to listen to your messages or manage your personal settings.
From another line (e.G. Cell or work phone)
- Dial your 3 digit prefix followed by the numbers 6 2 4 5 and follow the prompts.
You will be asked to enter your 10 digit phone number and then your PIN followed by the # key. Once you are logged in, all of the menus are the same.
Voice Mail Main Menu
- To play inbox messages, dial 1
- To send messages, dial 2
- To work with Greetings, dial 3
- To access mailbox settings, dial 4
- To access deleted messages, dial 6
- To log on as a different user, dial 7
- To access Help, dial 0
- To exit voice mail system, dial *
To change your pin or security options
- Access your voice mailbox
- From the main menu, dial 4
- For security options, dial 3
- To change your PIN, dial 1
- To change Fast Login (to require your phone # when accessing voice mail), dial 2
- To skip your PIN when calling from the line with voice mail, dial 3
Record your personal greeting
- Access your voice mailbox
- From the main menu, dial 3
- To set up a personal greeting, dial 1
- To set up a system generated greeting or to change the recording of your name, dial 3
- To change the greeting that callers hear when your line is busy, dial 5
- Any time you do not record a personal greeting, a generic greeting will be played
Group greetings
Step 1
- Enter your password, followed by #
Step 2
- To play current group greeting 1
- To keep this group greeting 5
- Delete this group greeting 7
- Record a new group greeting 9
- Return to main menu *
Accessing your sub-mailbox
Step 1
- Follow steps 1 and 2 from the section titled ‘Accessing Your Mailbox’
Step 2
- Enter your sub-mailbox number (sub-mailbox numbers will be 1, 2 or 3 )
OR
- Press the * key to administer the group greeting. See ‘Group Greetings’ on the back.
Step 3
- Enter your temporary PIN code, followed by #
- Your PIN code will be a default code of 6 2 4 5 2 6 9 (MAILBOX) until you change it.
Step 4 – Main Menu
- To listen to your messages. See ‘To Retrieve Messages’ 1
- To hear the mailbox IDs with new messages 5
- For current date and time 7
- To set up your voice mailbox. See ‘Mailbox Set-Up’ 9
- Press twice to return to main menu *
To register or get information, visit www.donotcall.gov or call (888)-382-1222.
Range VoIP Business Phone Solution
In business, every call counts. Let Range set your business up for success.
- Flexible pricing
- Fully customizable
- Take your business anywhere with a mobile app
- Crystal-clear voice, unlimited long distance, and more
- Download the Range 3CX User Guide
Range Managed IT Services
Range Managed IT Services offers a full suite of protection services to maintain critical networks and data protection, including
- Workstation, Firewall & Server Remote Management Monitoring
- SAAS – Software as a Service
- Cloud & AI Services
- Email Services
- Cybersecurity Awareness Training for your Team
- Real-time Monitoring & Support
Financial Assistance Programs
Everyone should have access to quality, affordable telecommunications or internet services. Learn more and apply for programs offering discounts to those who qualify.
Apps and Tools
Range Smart Home App
Range’s Smart Home App gives you an instant snapshot of your home or small business network. Through the app, you can view all the connected devices on your network, set up parental controls or a guest network, run speed tests, change your password, and more.
Range Smart Home App is FREE to all internet customers who have Range Gigaspire routers.
Range Smart Business
Range Smart Business gives you the tools you need to operate your self-managed Wi-Fi network:
- Better security to prevent cyberattacks
- Privacy protections
- Network control from your cellphone
- Automatic 24/7 cellular backup
- Generate customer sales leads
Streaming Services
Range’s StreamNow is your guide to streaming TV. The StreamNow platform will help you navigate through the many streaming options currently available in the marketplace.
- Learn the basics about smart TVs, streaming devices and streaming services, and tips to find your favorite shows. Range’s StreamNow Guide.
- Find Tutorials and Frequently Asked Questions
- Get started with streaming
- Choose your ideal internet speed
- Review your streaming service options
- Find, purchase and connect the right device
- Sign up for streaming services
Security & Helpful Tips
Using strong, hard-to-guess passwords is a smart way to ensure that your online accounts remain secure. Here are tips to keep your account locked down:
- Use a Long Password: Longer passwords are significantly harder to crack. Aim for at least 12-16 characters in length.
- Mix Character Types: Combine uppercase and lowercase letters, numbers and special symbols (such as !, @, #, etc;) to create a password that is unique to you.
- Avoid Common Words or Patterns: Try to avoid dictionary words, names or usernames and easily-guessed patterns like 12345, password, etc.
- Don’t Reuse Passwords: Every account should have a unique password. If one is compromised, having unique passwords may help keep your other accounts protected.
At every workplace, it is critical to ensure that only those authorized to view and work with sensitive information can do so. Always put a priority on cybersecurity from a physical standpoint.
- Control Access to Sensitive Areas: Implement electronic access controls like keycards, set permissions based on role, identify and escort all visitors and immediately revoke workplace access for terminated employees.
- Implement Clean-Desk Policies: Use locked cabinets or drawers for sensitive document storage and do not leave passwords or confidential information visible. Encourage employees to clear desks of sensitive documents before leaving.
- Protect Devices and Workstations: Anchor equipment (ex. laptops, external drives) to desks in public/shared areas. Never allow “tailgating” (unauthorized individuals following someone through a secure door).
- Secure Backup Storage: Store backup media (USBs, external hard drives) in locked, access-controlled areas and label and log who has access to each piece of backup media.
- Be Prepared for Emergencies: Equip facilities with surveillance and alarm systems and emergency exit protocols.
Phishing is the act of posing as a legitimate entity in order to steal personal, sensitive information - such as passwords, bank account details and other personal information - from targeted individuals. Phishing attempts can come via email, text messages, phone calls and other forms of communication. Tips for spotting phishing attempts:
- Watch For Unsolicited Messages: Don’t click links or download attachments from unexpected emails or texts, even if they look official. Be cautious of messages that create a sense of urgency (ex. “You’ve won a prize, claim it now!”) and do not share login details.
- Double-Check Email Addresses/Links: Hover over links to preview URLs and make sure that they match the legitimate domain. Also, look closely at sender addresses for spelling errors and/or deceptive tactics (ex. using a 0 in place of an o). Cybercriminals often use lookalikes meant to trick you.
- Use Proper Email Filtering: Ensure spam filters and phishing detectors are enabled and updated and consider commercial anti-phishing tools.
- Look For Red Flags: Many phishing emails have bad spelling and grammar, as well as inconsistent fonts, logos or visual glitches.
- Report Suspicious Material: If you suspect that you have been sent a message that’s a phishing attempt, do not open it. If the message is through a work messaging system, report it to your IT or cybersecurity team immediately.
Mobile devices are a prime target for cyberattacks because they’re always connected, often contain sensitive data and can be easily lost or stolen. Here are some pointers on how to keep mobile devices (such as smartphones and tablets) secure:
- Use Strong Screen Locks: Set a strong PIN, password and/or biometric lock, such as Face ID or fingerprints. Avoid easy-to-guess pins like 1234 or birthdays.
- Enable Device Encryption: Most modern mobile devices encrypt data by default, but make sure it’s enabled. On iOS, it’s enabled by default when you set a passcode. On Android, go to settings > security > encryption to make sure you’re secure.
- Limit App Permissions: Review which apps on your device have access to your location, camera, microphone, contacts, etc. Don’t grant permissions that aren’t necessary for the app’s function.
- Download Only From Official App Stores: Stick to the Apple App Store or Google Play for all app downloads. Third-party app stores often have apps loaded with malware.
- Enable MFA on Apps: Protect apps like email, banking and cloud storage with multi-factor authentication. Use an authenticator app rather than SMS, if possible.
Email is a common place for cyberattack attempts like phishing, malware and data leaks. Here are some email security tips to help reduce risk:
- Use Strong Security Methods: Your email is a gateway to everything else and its security must be of the utmost importance. Use a strong, unique password and multi-factor authentication for added protection.
- Watch For Phishing and Spoofing: Be on the lookout for phishing attempts and emails that appear to pose as a legitimate entity. Refer to the phishing tips section of this page for more information on how to spot phishing attempts.
- Verify Email Addresses: Double-check the addresses of those who send emails to you, especially if the email involves sensitive data. If you are unsure if the address is from a legitimate entity you know, contact that entity to confirm. If the message was sent to a work email, report it to your IT or cybersecurity team before proceeding.
- Encrypt Sensitive Emails: Many email services, such as Microsoft 365, have built-in encryption methods that help keep sensitive data secure. Ensure that your email service does the same.
- Regularly Audit Accounts: Delete old accounts or aliases that are no longer needed and review and remove unused third-party app accesses from your email settings.
- Don’t Use Personal Email For Business: Always separate work and personal communications. Using business-approved platforms makes compliance and security far easier to manage.
Ransomware is a type of malware that prevents the use of a device and/or services, usually by encrypting a victim’s personal data, until a ransom is paid. Here are some key tips to avoid falling victim to a ransomware attack:
- Install Security Software: Install and maintain antivirus/anti-malware software, firewalls and email security gateways to prevent unauthorized access. Keep all security software up to date to catch new variants of ransomware.
- Regularly Backup Data: Use data backups that are frequent (such as daily or weekly) and are off-network/cloud-based, as ransomware often attacks local or network-attached drives. Test those backups frequently to ensure they work in a real recovery scenario.
- Avoid Clicking Suspicious Links: Ransomware often spreads via malicious email attachments or links, such as through phishing. When in doubt, delete and report. Refer to the phishing tips section of this page for more information on how to spot phishing attempts.
- Disable Macros: Many ransomware variants use malicious macros in Word/Excel files (or similar programs). Configure Office (or similar programs) to require user approval before enabling macros.
- Segment Networks: Isolate critical systems (ex. finance, HR, servers) so ransomware can’t easily infiltrate your entire network. Ensure that users have access only to the services that they need to do their jobs.
- Have A Plan: Prepare for a ransomware scenario by identifying who to notify (ex. law enforcement) if you are a victim of an attack, as well as how to isolate infected machines and how to restore data from a backup.
- Software programs perform certain tasks and functions. The programs were tested repeatedly but certain sequences of events that the developers never expected (and thus not tested) can allow the software to get into a state where something is now broken.
- Switching the device off and on, will reload and reset the software and generally put all settings back to its original, stable state (the state that most testing was done in) and therefore will work again. We don’t understand it either but it’s worth a try and could potentially save you time and money.
