Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Spot a Scammer on a Dating Site: 9 Warning Signs
50% of Americans who have used a dating app in the past five years have experienced catfishing. Here’s how to spot a scammer on a dating site.

How To Recognize and Report Coinbase Scam Emails
Fraudsters use Coinbase scam emails to impersonate the company and dupe users into sharing login information. Here’s what can happen after.

The 7 Latest Chase Bank Scams (and How To Avoid Them)
Are you a Chase Bank customer? Don’t get scammed! Learn about the 7 latest Chase Bank scams (and how to avoid them).

Is Credit Monitoring Actually Worth It? How To Decide
Credit monitoring can protect you against fraud. But do you need to pay for it? Learn what credit monitoring does and how to decide if you need it.

How To Prevent Credit Card Fraud: 10 Essential Steps
Criminals use your physical card or stolen credit card numbers to make purchases in your name or impersonate you — here's how you can stop them.

How To Block Text Messages From Unknown Numbers (NEW)
Is your phone being bombarded with text messages from strangers? Learn the easiest ways to block text messages from unknown numbers.
text

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?

10 Text Message Scams You Didn't Know About (Until Now)
Scammers are everywhere — even in your text message inbox. Here are the 10 latest text message scams to be aware of (and how to avoid them).