Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Avoid Reverse Mortgage Scams
Scammers target reverse mortgages to try and steal the equity in your home — or worse. Here’s how to know if you’re dealing with a reverse mortgage scam.

How To Protect Your Home Title From Deed Theft
Deed fraud is a devastating scam where criminals forge your identity and steal the title to your home. Protect yourself by knowing the red flags.

The 12 Latest Types of Social Engineering Attacks (2024)
Hackers use social engineering attacks to manipulate you into giving them what they want — passwords, data, and money. Here’s how to protect yourself.

How Do Parental Controls Work? Setting Up Devices at Home
Content filtering, screen time limits, and internet usage all fall under the parental controls umbrella. Here’s how to set these up across devices.

TikTok Parental Controls: An Updated Guide for Parents
TikTok parental controls or Digital Wellbeing tools can manage screen time and content for kids. Turn on these features using this step-by-step guide.

When Should Kids Get Their First Phones?
Deciding when to give your child their first phone will depend on their maturity level, situation, and trust level. Here’s how to know if they’re ready.
text

How To Keep Your Kids and Teens Safe on Social Media
Social media safety for kids can be a confusing topic. Learn how to protect your children from the risks of social media and limit their screen time.

How To Identify a Fake Text Message Scam [With Examples]
Almost a quarter of all fraud cases start out as text scams. Learn how to quickly identify a fake text message scam and keep your phone (& finances) secure.

What Is Digital Security? Steps to Stay Safe Online (NEW)
The pandemic introduced us to remote socialization, school, work, and even healthcare. But have you truly mastered the art of digital security?

Here's How To Know If Your Identity Has Been Stolen
Nearly 50% of Americans have experienced identity theft. Here's how to find out if someone has stolen your identity.

25 Warning Signs of Identity Theft: How To Tell If You're a Victim
Are you worried that someone may have stolen your identity? Learn the 25 most common warning signs of identity theft and how to protect yourself today.

Change-of-Address Scams: Why Scammers Want Your Address
With just your name and address, scammers can steal your identity and commit financial fraud. Here’s how to protect yourself from a change-of-address scam.