Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →

What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.

How To Write a Credit Dispute Letter (and Repair Your Credit)
A credit dispute letter can restore your credit score after identity fraud. Learn when to send the letter and what to include.
text

Is Roblox Safe for Kids? The Parental Safety Guide (2024)
While most in-game experiences on Roblox are tame, there have been cases where it inadvertently exposed kids to harmful content, including gambling.

The 11 Latest Telegram App Scams To Watch Out For
Scammers have flocked to Telegram in recent years. Here’s how to keep your personal information, crypto, and online accounts safe from Telegram app scams.

The Top 5 Identity Theft Protection Apps (Reviewed and Rated)
Identity theft protection apps let you respond to identity theft alerts while on the go. This guide provides an in-depth comparison of five options.

How To Avoid The 7 Latest Ally Bank Scams (2024)
Ally Bank has been hit with several security issues in recent years. If you’re a customer, you need to know how to spot the latest scams and risks.

What Can Someone Do With Your IP Address? 10 Risks To Know
Your IP address can give hackers access to sensitive device and location info that they can use to tailor personalized phishing attacks and scam you.

How To Put Parental Controls On Your Child's iPad
Apple’s built-in parental controls for iPads can control the content your children can access — but falls short when protecting them from online threats.