Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Here's How To Know If Your Identity Has Been Stolen
Nearly 50% of Americans have experienced identity theft. Here's how to find out if someone has stolen your identity.

25 Warning Signs of Identity Theft: How To Tell If You're a Victim
Are you worried that someone may have stolen your identity? Learn the 25 most common warning signs of identity theft and how to protect yourself today.

Change-of-Address Scams: Why Scammers Want Your Address
With just your name and address, scammers can steal your identity and commit financial fraud. Here’s how to protect yourself from a change-of-address scam.

Lost or Stolen Wallet? 12 Important Steps to Take
A lost wallet is more than an annoyance — it can put you at risk of fraud and identity theft. Here are the steps to take when your wallet is missing.

I Replied to a Spam Text — What Should I Do Now?
If you replied to a spam text you could be at risk of identity theft or having your phone hacked. Learn how to stay safe after replying to a spam text.

Did the DMV Text You? Here’s How To Know If It’s a Scam
Scammers impersonate the DMV to fool you into giving them money and personal information. Learn how to identify the most common DMV text scams.
text

The 8 Best Spam Call Blocker Apps for Stopping Unwanted Calls
Phone scammers can bypass built-in and basic spam call blockers — but a new breed of AI-powered tools can finally protect you from non-stop spam calls.

How To Know If Your Phone Is Hacked (12 Warning Signs)
Signs of a hacked phone include reduced battery life, higher data usage, unusual device behavior, new apps, locked accounts, or receiving 2FA codes.

How To Know If a Recruiter Is Legit: 7 Recruitment Scam Red Flags
Fake recruiters prowl LinkedIn, post on Indeed, and reach out to victims with non-existent job offers — but you can spot them if you know what to look for.

Email Found on the Dark Web? Here’s How To Protect Yourself
If you’ve been part of a data breach, there’s a good chance that your email can be found on the Dark Web — but is this something you need to worry about?

The Easiest Ways To Prevent Identity Theft [8 Steps]
While it’s impossible to completely prevent all types of identity theft, you can make yourself a much less vulnerable target with a few protective measures.

How Long Does It Take To Recover From Identity Theft?
The time it will take to recover after your identity has been stolen will depend on what information was stolen, how it was used, and how quickly you act.