Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

The 7 Latest Bank of America Scams and How To Identify Them
Scammers target Bank of America customers to gain access to their accounts and steal their money. Learn the latest BofA scams and how to avoid them.

Wells Fargo Scam Texts: How To Spot Them and Protect Your Money
Wells Fargo scam texts can trick you out of thousands of dollars. Learn how to identify text scams, reduce spam, and protect your money.

How To Avoid The 8 Latest eBay Gift Card Scams
Fraudsters are targeting eBay gift cards at record numbers. Learn how to spot common eBay gift card scams and what to do if you’ve been scammed.

Social Media Privacy: What Are The Risks? (How To Stay Safe)
Are you unknowingly giving scammers or predators your personal information? Learn how to identify social media privacy risks and secure your accounts.

6 Rental Scams: How To Tell If a Listing is Genuine
Rental scams target renters with fake listings, fraudulent leases, and more. Here’s how to avoid getting scammed while finding your next apartment or home.

How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?
text

YouTube Parental Controls: 4 Ways To (Easily) Get Started
Here’s a step-by-step breakdown of how to set up YouTube parental controls, so your kids can enjoy a safe online experience.

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.