Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

What is Vishing? How To Identify Phone Scams (15 Examples)
Vishing — when scammers call you and trick you into sending them money or information — is skyrocketing. Don’t fall for these 15 phone scams!

What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.

How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.

How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.

How To Prove a Debt Is Not Yours (and Dispute It)
Did you find a strange debt in your name? It could be a sign of identity theft. Learn how to prove a debt is not yours and protect yourself against fraud.

The 10 Latest Work From Home Scams You Need To Know
Are you looking for a new job? Don’t get caught by a work-from-home scam. Here’s how to stay safe while looking for work online.
text

Is Coinbase Safe? How To Protect Your Cryptocurrency
Coinbase is one of the largest cryptocurrency exchanges — but it’s not without its risks. Follow these tips to keep your account (and crypto) safe.

Is Snapchat Safe For Kids? What Parents Need to Know
Snapchat is one of the most popular social media apps for teens — but some features can make your child vulnerable to predators and other online threats.

How Do Password Managers Work? [Step-by-Step Guide]
Password managers provide an easy way to securely create, store, and use complex passwords for all of your accounts — as long as you set them up correctly.

BeenVerified Opt-Out Guide: How To Remove Your Info For Good
BeenVerified collects and sells personal data that can put you at risk of spam — and scams. Follow this guide to remove your information for good.

What Is a Password Spraying Attack? (Risks and Warning Signs)
Hackers use password spraying attacks to take advantage of weak or common passwords and access your online accounts — unless you follow these safety tips.

Is Kroll Monitoring Legitimate? What You Need to Know
Kroll provides identity monitoring to customers of companies impacted by data breaches — but its lack of features could make you think twice before signing up.