Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

What To Do If You Click on a Phishing Link
Clicking on a phishing link can transmit basic information like your location and device stats, redirect you to a fake website, or download malware.

Fake Check Scams: How To Identify Them (& What To Do)
Americans lost almost $80 million to fake check scams last year alone. Learn how to spot the signs of a fake check and what to do if you receive one.

Help—Someone Forged My Signature On a Check and Cashed It
Check forgery scams are on the rise. Here’s what to do to protect your finances and identity if someone forged your signature on a check and cashed it.

What Happens if You Unknowingly Deposit a Fake Check?
Did you unknowingly deposit a fake check? Here’s what happens next and what you can do to protect yourself.

Scammed on eBay? Here's How To Get Your Money Back
Were you scammed on eBay by a seller? Don’t panic. Here’s what you can do to get your money back and how to spot eBay scams in the future.

How to Avoid Airline Scams That Can Take You For a Ride
Scammers create fake airline booking websites with discounted tickets, pose as airline staff, and even offer free tickets to steal your information.
text

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →