Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?

10 Text Message Scams You Didn't Know About (Until Now)
Scammers are everywhere — even in your text message inbox. Here are the 10 latest text message scams to be aware of (and how to avoid them).

What Are Trackers? How To Stop Being Tracked Online
Trackers collect, store, and share information about you while you browse or shop online — which can become a major privacy concern if you’re not careful.

Discover Identity Theft Protection Review: Is It Worth It?
Learn how Discover Identity Theft Protection compares to other identity theft protection services including LifeLock and Aura.
text

How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?

What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.

How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.

Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.

What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.

What To Do If You’ve Been Scammed Out Of Money
Whether you’ve sent scammers gift cards, crypto, or cash, there’s still hope. Learn how to try and get your lost money back and prevent further fraud.