Digital Security 101

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Block Ads (Easiest Methods For Each Platform)
Ads and pop-ups aren’t just annoying; they can also put your online privacy and safety at risk — luckily you can block them on almost every platform.

How To Tell If Your Facebook Has Been Hacked Right Now
Facebook has built-in tools that can help you quickly determine if your account has been hacked (and regain access if it has been compromised).

How To Prevent Identity Theft Online (and Secure Your Data)
If hackers gain access to your personal info, they can target your most sensitive online accounts — from online banking to your email or social media.

Is LifeLock Worth It? What You Need To Know Before You Buy
LifeLock is a well-known name in identity theft protection, though its pricing and past security issues may prompt you to explore other options.

How To Protect Your Personal Information Online
While it’s nearly impossible to prevent your personal information from ending up online, you can take steps to secure your accounts before it’s too late.

How To Remove Your Information From the Dark Web
While it’s nearly impossible to remove your leaked data from the Dark Web, you can take steps to protect yourself against the consequences of a data leak.

How To Avoid The 15 Most Common Holiday Scams This Year
Scammers ramp up their schemes during the holiday season. Learn how to avoid the worst holiday scams while shopping, traveling, and giving online.
text

How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?

What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.

How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.

Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.

What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.

What To Do If You’ve Been Scammed Out Of Money
Whether you’ve sent scammers gift cards, crypto, or cash, there’s still hope. Learn how to try and get your lost money back and prevent further fraud.