Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Is Etsy Safe? 7 Etsy Scams You Didn’t Know About (Until Now)
Don’t get scammed while shopping on Etsy. Learn how to identify the latest Etsy scams and how to get your money back if you’ve been scammed.

12 Internet Safety Tips For Kids and Teens
Follow these internet safety tips to keep your kids and teens safe online. Learn how to block harmful content, avoid predators, and more.

How To Spot a Chase Phishing Email (5 Chase Email Scams)
Did you receive a strange email claiming to be from Chase Bank? It could be a scam. Learn how to identify the latest Chase phishing email scams.

Help! Someone Opened a Cell Phone Account in My Name
Is there an unfamiliar cell phone account in your name or did your phone suddenly stop working? Learn what it could mean and why you need to act quickly.

I Got Scammed on Venmo. Can I Get My Money Back?
Did you get scammed on Venmo? Here’s how you can try to get your money back and how to avoid common Venmo scams in the future.

Was Your Email Hacked? Here's How To Know And What To Do
Was your email hacked? This guide explains how to know for sure. Learn how hackers can break into your email, and what to do if you get hacked.
text

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?

10 Text Message Scams You Didn't Know About (Until Now)
Scammers are everywhere — even in your text message inbox. Here are the 10 latest text message scams to be aware of (and how to avoid them).