Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

12 Alarming Senior Citizen Scams: What You Need to Know
Older adults are less likely to spot the warning signs of scams early on or reach out for help when they've fallen victim.

How To Identify Medicare Scam Calls: Avoid These 9 Scams
Medicare scam calls are one of the most common ways that criminals try to steal your sensitive health information. Here’s how to identify and avoid them.

7 Dangerous OfferUp Scams & How to Avoid Them
Thieves recycle the same tactics to dupe people online; these 7 OfferUp scams are no exception. Here’s what to do.

YouTube Parental Controls: 4 Ways To (Easily) Get Started
Here’s a step-by-step breakdown of how to set up YouTube parental controls, so your kids can enjoy a safe online experience.

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.
text

How Is Mortgage Fraud Detected? 20 Types of Fraud To Know
Those who commit mortgage fraud may be subject to prosecution, either for “fraud for housing” or “fraud for profit.” Here’s how to spot them.

How To Avoid Reverse Mortgage Scams
Scammers target reverse mortgages to try and steal the equity in your home — or worse. Here’s how to know if you’re dealing with a reverse mortgage scam.

How To Protect Your Home Title From Deed Theft
Deed fraud is a devastating scam where criminals forge your identity and steal the title to your home. Protect yourself by knowing the red flags.

The 12 Latest Types of Social Engineering Attacks (2024)
Hackers use social engineering attacks to manipulate you into giving them what they want — passwords, data, and money. Here’s how to protect yourself.

How Do Parental Controls Work? Setting Up Devices at Home
Content filtering, screen time limits, and internet usage all fall under the parental controls umbrella. Here’s how to set these up across devices.

TikTok Parental Controls: An Updated Guide for Parents
TikTok parental controls or Digital Wellbeing tools can manage screen time and content for kids. Turn on these features using this step-by-step guide.