Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How Do Password Managers Work? [Step-by-Step Guide]
Password managers provide an easy way to securely create, store, and use complex passwords for all of your accounts — as long as you set them up correctly.

BeenVerified Opt-Out Guide: How To Remove Your Info For Good
BeenVerified collects and sells personal data that can put you at risk of spam — and scams. Follow this guide to remove your information for good.

What Is a Password Spraying Attack? (Risks and Warning Signs)
Hackers use password spraying attacks to take advantage of weak or common passwords and access your online accounts — unless you follow these safety tips.

Is Kroll Monitoring Legitimate? What You Need to Know
Kroll provides identity monitoring to customers of companies impacted by data breaches — but its lack of features could make you think twice before signing up.

Identity Fraud vs. Identity Theft: What You Need To Know
While identity theft and identity fraud are similar, there are nuances between the two crimes that you should know about in order to stay safe.

How To Find and Update Your Compromised Passwords
Data breaches have surged by 90% since the start of 2024, putting your passwords at risk. It’s time to identify and update your vulnerable credentials.
text

How To Identify a Fake Text Message Scam [With Examples]
Almost a quarter of all fraud cases start out as text scams. Learn how to quickly identify a fake text message scam and keep your phone (& finances) secure.

What Is Digital Security? Steps to Stay Safe Online (NEW)
The pandemic introduced us to remote socialization, school, work, and even healthcare. But have you truly mastered the art of digital security?

Here's How To Know If Your Identity Has Been Stolen
Nearly 50% of Americans have experienced identity theft. Here's how to find out if someone has stolen your identity.

25 Warning Signs of Identity Theft: How To Tell If You're a Victim
Are you worried that someone may have stolen your identity? Learn the 25 most common warning signs of identity theft and how to protect yourself today.

Change-of-Address Scams: Why Scammers Want Your Address
With just your name and address, scammers can steal your identity and commit financial fraud. Here’s how to protect yourself from a change-of-address scam.

Lost or Stolen Wallet? 12 Important Steps to Take
A lost wallet is more than an annoyance — it can put you at risk of fraud and identity theft. Here are the steps to take when your wallet is missing.