Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Deep Web vs. Dark Web: What You Need To Know To Stay Safe
Learn the differences between the Deep and Dark Web, how to safely use them, and what you can do to stay safe online.

How To Avoid Apple Phishing Emails (Apple ID Scams)
Apple phishing emails are getting more sophisticated — and harder to identify. Learn how to protect your Apple account from hackers and scammers.

Ticketmaster Scams: Is It Safe To Buy Tickets on Ticketmaster?
Can you get scammed on Ticketmaster? Learn how to spot the most common Ticketmaster scams and how to safely buy tickets for your next big event.

Was Your Apple ID Hacked? Here's How To Secure Your Account
A hacked Apple ID can give scammers access to your most sensitive information — not to mention photos and videos. Learn how to secure your account.

How To Identify Amazon Email Scams (Before You Lose Money)
Amazon email scams can steal your life savings or identity. Know the red flags and how to protect your finances from fraudsters.

How To Identify (and Avoid) Publishers Clearing House Scams
Scammers use the promise of winnings to trick you into giving up money or sensitive information. Learn about the latest Publishers Clearing House scams.
text

YouTube Parental Controls: 4 Ways To (Easily) Get Started
Here’s a step-by-step breakdown of how to set up YouTube parental controls, so your kids can enjoy a safe online experience.

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.