Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

The Latest UPS Text Scams To Watch Out For
Did you just get a text from UPS? Be careful. It could be a scam! Here’s how to identify the latest UPS text scams and what to do if you get one.

How To Block Spam Texts From Email Addresses
Are you getting spam and scam texts from email addresses? Learn why this happens, what it means, and how to block texts from emails.

How To Stop Spam Texts (on Android and iPhone)
Millions of spam texts are sent every single day. Learn how to stop spam texts, block spammers, and protect your phone and identity from criminals.

Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.

17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.

How To Spot a Bank of America Phishing Email
Did you get a suspicious email from Bank of America? It could be a scam. Learn to spot the warning signs of a Bank of America phishing email.
text

How To Tell If You've Been Hacked: 12 Warning Signs
The sooner you recognize the signs of a hack, the better chance you have of shutting down hackers and scammers before they can do too much damage.

How Can I Find Out If Someone Is Using My Social Security Number?
A compromised Social Security number can lead to identity theft, fraud, and worse. Learn how to tell if someone is using your SSN without your permission.

How To Prevent Medical Identity Theft: 7 Must-Do Steps
Preventing medical identity theft starts with locking down your health insurance information, having 2FA on related apps, and tracking your medical records.

The 7 Best McAfee Competitors and Alternatives (How To Choose)
While McAfee was once a household name for digital security, its products aren’t as well-suited to combat modern cyberthreats compared to the alternatives.

How To Protect Your Privacy Online
Your personal information is easily available online to anyone who knows where to look — unless you take these steps to secure your online identity.

The 6 Best Credit Monitoring Apps (Track Your Credit Scores)
Credit monitoring apps help track your credit score, warn you of fraud, and educate you about building credit — but not all are worth your time and money.