Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

What Is Whaling Phishing? How To Avoid Executive Fraud
Whaling — also known as CEO fraud — is a type of phishing attack that targets and/or impersonates C-level executives in a company.

New Netflix Scams: Why Someone Could Be After Your Account
Phishing emails make up the lion’s share of all Netflix scams today, but there are other ways that you could be caught off guard.

80+ of the Worst Hacked Celebrities From the Last Decade
Hackers have targeted celebrities from Rihanna to Arianna Grande. But you don’t have to be famous to be on their list. Here’s how to keep yourself safe.

Can Someone Steal Your Identity With Your ID?
Can someone steal your identity if they have your ID? Unfortunately, yes. Learn how to prevent identity theft if your ID gets lost or stolen.

Brushing Scam: Is This Free Amazon Package Legit?
Did an unexpected Amazon package show up on your door? If so, you might be the target of a brushing scam. Here’s what to do about it.

How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.
text

How To Tell If You've Been Hacked: 12 Warning Signs
The sooner you recognize the signs of a hack, the better chance you have of shutting down hackers and scammers before they can do too much damage.

How Can I Find Out If Someone Is Using My Social Security Number?
A compromised Social Security number can lead to identity theft, fraud, and worse. Learn how to tell if someone is using your SSN without your permission.

How To Prevent Medical Identity Theft: 7 Must-Do Steps
Preventing medical identity theft starts with locking down your health insurance information, having 2FA on related apps, and tracking your medical records.

The 7 Best McAfee Competitors and Alternatives (How To Choose)
While McAfee was once a household name for digital security, its products aren’t as well-suited to combat modern cyberthreats compared to the alternatives.

How To Protect Your Privacy Online
Your personal information is easily available online to anyone who knows where to look — unless you take these steps to secure your online identity.

The 6 Best Credit Monitoring Apps (Track Your Credit Scores)
Credit monitoring apps help track your credit score, warn you of fraud, and educate you about building credit — but not all are worth your time and money.