Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Protect Your Home Title From Deed Theft
Deed fraud is a devastating scam where criminals forge your identity and steal the title to your home. Protect yourself by knowing the red flags.

The 12 Latest Types of Social Engineering Attacks (2024)
Hackers use social engineering attacks to manipulate you into giving them what they want — passwords, data, and money. Here’s how to protect yourself.

How Do Parental Controls Work? Setting Up Devices at Home
Content filtering, screen time limits, and internet usage all fall under the parental controls umbrella. Here’s how to set these up across devices.

TikTok Parental Controls: An Updated Guide for Parents
TikTok parental controls or Digital Wellbeing tools can manage screen time and content for kids. Turn on these features using this step-by-step guide.

When Should Kids Get Their First Phones? 2024 Guide
Deciding when to give your child their first phone will depend on their maturity level, situation, and trust level. Here’s how to know if they’re ready.

LinkedIn Scams: 10 Ways You Could Be at Risk on the Platform
LinkedIn has over 900 million users — but honest professionals aren’t the only ones on the platform. Here are 10 common LinkedIn scams to know.
text

How to Avoid The Latest Charity Scams (2023)
The last thing you want when donating money is to send it to a scam charity. Learn how to sport charity fraud and avoid charity scams.

14 Dangers of Identity Theft That Can Leave You Reeling
From financial devastation to emotional pain, the dangers of identity theft are serious. Don't let identity theft cripple your life.

How To Identify Veterans Charity Scams (10 Examples)
Here’s how to spot a veterans charity scam and make sure your donations are going to the right place — in the pockets of our veterans.

Why Do Scammers Want Gift Cards?
Is it safe to pay with gift cards? Learn the latest gift card scams and why scammers always seem to want gift cards.

How To Avoid the Worst Christmas Scams of 2023
Scammers have sunk to new lows this Christmas season, even targeting your grandparents. Learn how to protect yourself while shopping online this year.

Can Macs Get Viruses? How To Remove Malware From Macs
Yes, Mac computers can be infected with malware and other viruses. Learn how to identify a virus and safely remove malware from your Mac.