Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Did You Give Your SSN To Scammers? Do This Now
Scammers can use your Social Security number to steal your identity — or worse. Here’s what you need to do if you accidentally gave your SSN to scammers.

Can Someone Hack Your Phone With Just Your Number?
If a hacker has your phone number you could be at risk of identity theft, financial fraud, and more. Here’s how to keep your number and your identity safe.

Is Minecraft Safe For Kids? What Parents Need To Know
Is Minecraft safe for kids? There are underlying risks to this popular video game. Parents need to know more to protect their children.

How To Protect Your Bank Account From Identity Theft [NEW]
Scammers will go to any length to get access to your accounts and financial information. Here’s how to protect your bank account from identity theft.

What Is Synthetic Identity Theft? (and How To Protect Yourself)
Criminals combine stolen and fake information to create "synthetic" identities. But while the IDs are fake, they can do real damage to you.

Family Identity Theft Protection: The Parental Guide for 2025
Protecting your kids, parents, and entire family from online risks in 2024 requires a combination of tools, tips, and best practices.
text

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?

10 Text Message Scams You Didn't Know About (Until Now)
Scammers are everywhere — even in your text message inbox. Here are the 10 latest text message scams to be aware of (and how to avoid them).