Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Did You Get a Dark Web Alert? How To Secure Your Accounts
If your PII surfaces on a cybercrime forum or website, there are ways for you to receive early notifications. This is where Dark Web alerts come in.

Scammed Using Apple Pay? Here's How To Get Your Money Back
Were you scammed on Apple Pay? Here’s how you can identify common Apple Pay scams and dispute fraudulent charges to try and get your money back.

Was Your IP Address Hacked? How To Tell & What To Do
If your IP address is hacked, scammers can gain enough information to break into your financial accounts or steal your identity. Here’s how to stay safe.

What Is Credit Protection? 4 Options (and How To Choose)
Credit protection covers a wide range of tools that can protect your finances. Learn about the most common types of credit protection and how to choose.

Debt Collector Scams: How To Tell If a Debt Collector Is Legit
Did you get a phone call, letter, or message about unfamiliar debt? It could be a scam. Learn the latest debt collector scams and how to stay safe.

What Can Scammers Do With Your Passport Number?
A compromised passport number can lead to identity theft and fraud. Learn how to tell if your passport number is stolen and how to protect yourself.
text

The 8 Best Spam Call Blocker Apps for Stopping Unwanted Calls
Phone scammers can bypass built-in and basic spam call blockers — but a new breed of AI-powered tools can finally protect you from non-stop spam calls.

How To Know If Your Phone Is Hacked (12 Warning Signs)
Signs of a hacked phone include reduced battery life, higher data usage, unusual device behavior, new apps, locked accounts, or receiving 2FA codes.

How To Know If a Recruiter Is Legit: 7 Recruitment Scam Red Flags
Fake recruiters prowl LinkedIn, post on Indeed, and reach out to victims with non-existent job offers — but you can spot them if you know what to look for.

Email Found on the Dark Web? Here’s How To Protect Yourself
If you’ve been part of a data breach, there’s a good chance that your email can be found on the Dark Web — but is this something you need to worry about?

The Easiest Ways To Prevent Identity Theft [8 Steps]
While it’s impossible to completely prevent all types of identity theft, you can make yourself a much less vulnerable target with a few protective measures.

How Long Does It Take To Recover From Identity Theft?
The time it will take to recover after your identity has been stolen will depend on what information was stolen, how it was used, and how quickly you act.