Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Does Two-Factor Authentication Prevent Hacking?
MFA is not a silver bullet, but it’s far more effective than a password-only authentication method. In conjunction, also use a VPN, password manager.

Does Credit Repair Work? Should You Use This Service?
Credit repair can remove inaccuracies from credit reports. People with no credit, good credit, or deserved bad credit might have little use for it.

What Is Criminal Identity Theft? (How To Protect Yourself)
Criminals can use your identity during crimes and leave you with a criminal record. Learn about the risks of criminal identity theft and how to prevent it.

The Unexpected Dangers of Online Dating [11 Scams To Know]
Millions of people have found love through online dating — but millions more have been the victims of scammers. Here’s how to stay safe while dating online.

7 Consequences Of Your Digital Footprint You Need To Know
The information in your digital footprint can have serious consequences to your online and real-world reputation — unless you take steps to reduce it.

What Is a VPN on iPhones? Why You Need It, How To Enable It
Private Relay won’t solve all of your privacy problems, but an iPhone VPN can fortify your entire online experience. But that’s not all it can do.
text

The 7 Latest Amazon Scam Calls (and How To Spot Them)
Amazon phone scams are running rampant, with Americans receiving over 100 million every month. Learn how to identify the most common Amazon scam calls.

7 Signs of a Social Security Scam Call
Here’s what you need to know about Social Security scam calls and what to do if you realize you're on the phone with an SSA imposter.

What is Vishing? How To Identify Phone Scams (15 Examples)
Vishing — when scammers call you and trick you into sending them money or information — is skyrocketing. Don’t fall for these 15 phone scams!

What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.

How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.

How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.