Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Loan Fraud Explained: How Scammers Get Free Money In Your Name
If a criminal steals your identity, they can get loans on cars, homes, and businesses in your name. Here’s how to stop loan fraud from happening to you.

Is Bark Worth It? What Parents Should Know Before Buying
Bark has been a leader in parental controls software for years — but many users complain about its functionality and how easy it is to circumvent.

Online Banking Security: How To Keep Your Accounts Safe
Banks spend millions on online security — but it’s not always enough to keep scammers out. Follow these steps to secure your online bank account.

How To Properly Set Up Your Social Media Privacy Settings
Scammers, stalkers, and hackers can use public information on your social media profiles to target you — unless you change your privacy settings.

How Can Someone Track My Location? (How To Stop Them)
Scammers and stalkers can track your location by using spyware or legal apps on your phone — unless you follow these steps to keep your location private.

How To Spot LinkedIn Job Scams (11 Warning Signs)
Scammers use LinkedIn to post fake job listings, impersonate recruiters, and trick you into giving them sensitive information or sending money.
text

The 7 Latest Amazon Scam Calls (and How To Spot Them)
Amazon phone scams are running rampant, with Americans receiving over 100 million every month. Learn how to identify the most common Amazon scam calls.

7 Signs of a Social Security Scam Call
Here’s what you need to know about Social Security scam calls and what to do if you realize you're on the phone with an SSA imposter.

What is Vishing? How To Identify Phone Scams (15 Examples)
Vishing — when scammers call you and trick you into sending them money or information — is skyrocketing. Don’t fall for these 15 phone scams!

What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.

How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.

How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.