Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Prevent Cyberbullying: A Parental Guide
Cyberbullying can have devastating effects on children and teens. Learn how to identify and prevent cyberbullying and keep your family safe online.

The 5 Latest Hinge Scams: How To Identify a Hinge Scammer
Dating and romance scams are at an all-time high. Learn how to spot the latest Hinge scams, and stop Hinge scammers before it’s too late.

PayPal Account Hacked? Here's How To Recover It
Is your PayPal account hacked? Learn the warning signs and how to prevent scammers from stealing your money and personal information.

Victim of Fraud? Follow These 12 Recovery Steps ASAP
The best thing you can do if you’re the victim of fraud is to act fast! Follow this checklist to secure your accounts and restore your stolen funds.

My Parents Are Using My Social Security Number — Should I Report Them?
Child identity theft by a parent can go unnoticed for years if guardians don’t spot early warning signs. How does it unfold? What can you do about it?

How To Control Internet Access at Home (And Block Content)
Are your kids safe online? Learn how to control internet access at home to minimize threats from scammers, hackers, and cyberbullies.
text

YouTube Parental Controls: 4 Ways To (Easily) Get Started
Here’s a step-by-step breakdown of how to set up YouTube parental controls, so your kids can enjoy a safe online experience.

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.