Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

15 Amazon Scams You Didn’t Know About (Until Now)
Amazon scams are on the rise. Get familiar with how common scams work to protect your family and finances.

What To Do If a Scammer Has Your Email Address
Your email address is a precious commodity for fraudsters. Here’s what you should do if a scammer has your email address to stay safe.

How To Avoid the 8 Latest Zelle Scams (Updated)
Zelle is fast and easy to use. But is it safe? Here’s a list of the latest Zelle scams you need to watch out for and how you can keep your money safe.

How to Recognize & Avoid the 7 Most Common Geek Squad Scams
Geek Squad scams impersonate Best Buy employees to bilk innocent victims. Here are the 7 most common scams and how to spot them right away.

What Can a Scammer Do With Your Medicare Number?
Scammers use phishing tactics to trick victims into giving up their Medicare number — and then use it to steal health benefits or worse.

Is It Bad To Have Too Many Credit Cards?
Is it bad to have too many credit cards? There's no right or wrong answer, but your credit score may be impacted. Learn more with this essential guide.
text

YouTube Parental Controls: 4 Ways To (Easily) Get Started
Here’s a step-by-step breakdown of how to set up YouTube parental controls, so your kids can enjoy a safe online experience.

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.