Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Tell If Your Computer Has a Virus (and Remove It)
Is your computer acting strangely? Learn how to recognize if your computer has a virus and what to do next to stay safe and secure.

What To Do With an Old SIM Card (Don't Throw It Out!)
Old SIM cards can put you at risk of hacking and identity theft. Learn what to do with your old SIM card to keep yourself safe and secure.

Help! A Family Member Opened a Credit Card In My Name
It’s a crime for a family member to open a credit card in your name (and without your knowledge). Here’s how to handle this precarious situation.

The Dark Web Explained: How It Works & Why It's So Dangerous
See how cybercriminals profit from your personal information on the Dark Web. Learn how to protect your data from financial fraud and identity theft.

Child Identity Theft: The Parental Guide to Protecting Your Kids
More than 1 million children were the victims of child identity theft last year. Learn how to protect your kids from scammers in this parental guide.

What Do Hackers Do With Stolen Information?
Thieves may use stolen information to open fraudulent new bank accounts, apply for credit cards, or even demand a ransom. Can you prevent this?
text

Fingerprint Identity Theft: How To Keep Your Devices Secure
Are fingerprints more secure than a password? Not always. Here’s how hackers use stolen fingerprints to commit identity theft (and how to protect yourself).

What Is Medical Identity Theft? (Are You A Victim?)
Medical identity theft could cost you your life — unless you know the warning signs to look for and how to recover. Here’s what you need to know today.

How To Prevent Cyberbullying: A Parental Guide
Cyberbullying can have devastating effects on children and teens. Learn how to identify and prevent cyberbullying and keep your family safe online.

The 5 Latest Hinge Scams: How To Identify a Hinge Scammer
Dating and romance scams are at an all-time high. Learn how to spot the latest Hinge scams, and stop Hinge scammers before it’s too late.

PayPal Account Hacked? Here's How To Recover It
Is your PayPal account hacked? Learn the warning signs and how to prevent scammers from stealing your money and personal information.

Victim of Fraud? Follow These 12 Recovery Steps ASAP
The best thing you can do if you’re the victim of fraud is to act fast! Follow this checklist to secure your accounts and restore your stolen funds.