Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Answered: How To Stop Unwanted Texts on Your iPhone
Scammers send millions of spam and scam texts every single day. Learn seven of the best ways to stop unwanted texts on your iPhone.

How To Protect Yourself From Account Takeover Fraud (ATO)
Account takeover fraud is when scammers gain access to your online accounts — social media, online banking, etc. Learn how to keep your accounts secure.

Identity Theft of a Deceased Person [Recovery, Legal Action]
Obituaries and death notices are lucrative prowling grounds for scammers. Prevent the identity theft of a deceased person by taking these steps.

Fingerprint Identity Theft: How To Keep Your Devices Secure
Are fingerprints more secure than a password? Not always. Here’s how hackers use stolen fingerprints to commit identity theft (and how to protect yourself).

What Is Medical Identity Theft? (Are You A Victim?)
Medical identity theft could cost you your life — unless you know the warning signs to look for and how to recover. Here’s what you need to know today.

How To Prevent Cyberbullying: 2023 Parental Guide
Cyberbullying can have devastating effects on children and teens. Learn how to identify and prevent cyberbullying and keep your family safe online.
text

How To Lock Your Credit With All Three Bureaus
Credit locks are one of the best tools available for protecting your credit file from fraud and errors — but are more complicated than a fraud alert.

Stolen Tax Refund Check? Here’s How To Get Your Money Back
Tax season is scam season. If someone stole your tax refund check or filed for one under your name, here's how you can get it back and protect yourself.

Loan Fraud Explained: How Scammers Get Free Money In Your Name
If a criminal steals your identity, they can get loans on cars, homes, and businesses in your name. Here’s how to stop loan fraud from happening to you.

Is Bark Worth It? What Parents Should Know Before Buying
Bark has been a leader in parental controls software for years — but many users complain about its functionality and how easy it is to circumvent.

Online Banking Security: How To Keep Your Accounts Safe
Banks spend millions on online security — but it’s not always enough to keep scammers out. Follow these steps to secure your online bank account.

How To Properly Set Up Your Social Media Privacy Settings
Scammers, stalkers, and hackers can use public information on your social media profiles to target you — unless you change your privacy settings.