Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

The 9 Worst Wire Transfer Scams (and How To Avoid Them)
Wire transfer scams can rob your house deposit or life savings in minutes. Learn how wire fraud works, the red flags, and how to stay safe.

10 Amazon Gift Card Scams You Need To Avoid
Scammers love gift cards because they’re almost impossible to trace. Learn the latest Amazon gift card scams to help keep yourself and your money safe.

How Do Pharming Attacks Happen? (How To Protect Yourself)
Hackers use pharming attacks to steal your personal information and passwords. Here’s how to identify (and avoid) these dangerous fake websites.

Online Gaming Risks: Are Your Children Susceptible?
Your children face online gaming risks every time they play. Get on your kids’ level to protect them from cyberbullies, hackers, scammers, and predators.

Online Gaming Safety for Kids: What Parents Need To Know
Kids are spending more time gaming than ever before. Learn the basics of online gaming safety and how to protect your family from online threats.

Deep Web vs. Dark Web: What You Need To Know To Stay Safe
Learn the differences between the Deep and Dark Web, how to safely use them, and what you can do to stay safe online.
text

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?

10 Text Message Scams You Didn't Know About (Until Now)
Scammers are everywhere — even in your text message inbox. Here are the 10 latest text message scams to be aware of (and how to avoid them).