Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Here's How To Know If Your Identity Has Been Stolen
Nearly 50% of Americans have experienced identity theft. Here's how to find out if someone has stolen your identity.

25 Warning Signs of Identity Theft: How To Tell If You're a Victim
Are you worried that someone may have stolen your identity? Learn the 25 most common warning signs of identity theft and how to protect yourself today.

Change-of-Address Scams: Why Scammers Want Your Address
With just your name and address, scammers can steal your identity and commit financial fraud. Here’s how to protect yourself from a change-of-address scam.

Lost or Stolen Wallet? 12 Important Steps to Take
A lost wallet is more than an annoyance — it can put you at risk of fraud and identity theft. Here are the steps to take when your wallet is missing.

I Replied to a Spam Text — What Should I Do Now?
If you replied to a spam text you could be at risk of identity theft or having your phone hacked. Learn how to stay safe after replying to a spam text.

Did the DMV Text You? Here’s How To Know If It’s a Scam
Scammers impersonate the DMV to fool you into giving them money and personal information. Learn how to identify the most common DMV text scams.
text

Is Identity Theft Protection Worth It? Only in These Cases
Identity theft protection services aren’t right for everyone. But if you’re a prior victim or have family members to protect, it could make sense for you.

What To Do If You Were Hacked: How To Recover Hacked Accounts
As soon as you see signs that your accounts or devices have been hacked, act quickly to remove malware, regain access, and minimize the damage.

How To Remove a Virus From Your Android Phone
Worried your Android phone or device has been infected? Follow these step-by-step instructions on how to identify and remove Android malware.

How To Dispute Debts in My Name (That Aren’t Mine)
Send a dispute letter to the collector within 30 days, dispute inaccuracies with credit bureaus, and request that the collector stop contacting you.

What is Credit Monitoring? Do You Really Need It?
Credit monitoring is one of the best ways to protect your credit score and catch the early warning signs of fraud — but only if you use the right service.

My Bank Account Has Been Hacked. Can I Get My Money Back?
Notify your bank to report any unauthorized transactions, start an investigation. Banks generally refund fraudulent transactions if reported promptly.