Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.

How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.

How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.

Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.

How To Avoid the 6 Latest Wells Fargo Scams
Wells Fargo scams can wipe out your savings with a single text message. Do you know the warning signs and how to stay safe?

The 7 Latest Amazon Scam Calls (and How To Spot Them)
Amazon phone scams are running rampant, with Americans receiving over 100 million every month. Learn how to identify the most common Amazon scam calls.
text

Is It Safe To Link Bank Accounts? 7 Risks You Need To Know
Is it safe to link bank accounts to other apps and services? Get familiar with the risks to protect your finances from fraudsters.

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?