Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Opt Out of Prescreened Credit Card Offers
The Prescreen Opt-Out Notice Rule lets you permanently opt out of prescreened offers, or opt out for five years. Here’s how.

Why Is My Credit Frozen If I Didn’t Freeze It?
System errors, file mixups, data breaches, or even identity theft may be why your credit is frozen without you initiating it.

What Can Someone Do with Your Social Security Number?
It’s easier than ever for scammers to get your SSN. Learn what someone can do with your Social Security number (and how to keep it safe).

How To Set Time Limits on Apps To Control Screen Time
Whether you’re trying to control your child’s screen time or your own, setting time limits can be a powerful tool — if you know how to do it properly.

Is Avast Safe? What To Know Before You Buy
Avast is a popular antivirus software option — but recent data privacy concerns have made some users skeptical about whether it’s still the right choice.

Canopy vs Bark: How To Choose Which One Is Best For You
Parental control apps like Canopy and Bark can block adult content, giving parents a sense of safety — but do these apps do enough to keep kids safe online?
text

How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?

What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.

How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.

Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.

What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.

What To Do If You’ve Been Scammed Out Of Money
Whether you’ve sent scammers gift cards, crypto, or cash, there’s still hope. Learn how to try and get your lost money back and prevent further fraud.