Digital Security 101

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Block Ads (Easiest Methods For Each Platform)
Ads and pop-ups aren’t just annoying; they can also put your online privacy and safety at risk — luckily you can block them on almost every platform.

Online Banking Security: How To Keep Your Accounts Safe
Banks spend millions on online security — but it’s not always enough to keep scammers out. Follow these steps to secure your online bank account.

How To Properly Set Up Your Social Media Privacy Settings
Scammers, stalkers, and hackers can use public information on your social media profiles to target you — unless you change your privacy settings.

How Can Someone Track My Location? (How To Stop Them)
Scammers and stalkers can track your location by using spyware or legal apps on your phone — unless you follow these steps to keep your location private.

How To Spot LinkedIn Job Scams (11 Warning Signs)
Scammers use LinkedIn to post fake job listings, impersonate recruiters, and trick you into giving them sensitive information or sending money.

How To Know If Your Phone Has a Virus
Unfamiliar apps and strange phone behavior are a few of the warning signs that your device has been infected and you need to take action immediately.

Is IDShield Worth It? What To Know Before Buying
IDShield claims to provide all-in-one protection against identity theft, fraud, and hacking — but has issues that could leave you vulnerable.
text

How To Tell If Your Computer Has a Virus (and Remove It)
Is your computer acting strangely? Learn how to recognize if your computer has a virus and what to do next to stay safe and secure.

What To Do With an Old SIM Card (Don't Throw It Out!)
Old SIM cards can put you at risk of hacking and identity theft. Learn what to do with your old SIM card to keep yourself safe and secure.

Help! A Family Member Opened a Credit Card In My Name
It’s a crime for a family member to open a credit card in your name (and without your knowledge). Here’s how to handle this precarious situation.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

The Dark Web Explained: How It Works & Why It's So Dangerous
See how cybercriminals profit from your personal information on the Dark Web. Learn how to protect your data from financial fraud and identity theft.

Child Identity Theft: The Parental Guide to Protecting Your Kids
More than 1 million children were the victims of child identity theft last year. Learn how to protect your kids from scammers in this parental guide.