Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

The Effects of Cyberbullying (And How To Protect Your Children)
The effects of cyberbullying can be hard to spot. But it’s crucial that parents know the warning signs to keep their kids safe online.

Scammer Phone Numbers: Beware of These Area Codes
How do you know if a scammer is calling? Start by ignoring these common scammer phone numbers. Then, learn how to block spam calls entirely.

Solved: Why Do Random Numbers Call Me and Hang Up?
Tired of random callers taking over your phone? Learn why random numbers are targeting you and how to block spam and scam calls for good.

What Are "Potential Spam" Calls? (and How To Block Them)
Is your phone being bombarded by “potential spam?” Learn where these calls come from and how to block them once and for all.

How To Block Spam Calls (Android, iOS, and Landlines)
Knowing how to block spam calls is essential. Scammers can clone your voice or steal your info in seconds — you must be proactive.

What Happens If You Call Back a Spam Number?
Do you know what happens if you call back a spam number? Here's everything you need to know to avoid becoming a victim of scam calls.
text

How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.

Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.

What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.

How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.

How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.

Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.