Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.

How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.

How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.

Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.

Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.

7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
text

Is Coinbase Safe? How To Protect Your Cryptocurrency
Coinbase is one of the largest cryptocurrency exchanges — but it’s not without its risks. Follow these tips to keep your account (and crypto) safe.

Is Snapchat Safe For Kids? What Parents Need to Know
Snapchat is one of the most popular social media apps for teens — but some features can make your child vulnerable to predators and other online threats.

How Do Password Managers Work? [Step-by-Step Guide]
Password managers provide an easy way to securely create, store, and use complex passwords for all of your accounts — as long as you set them up correctly.

BeenVerified Opt-Out Guide: How To Remove Your Info For Good
BeenVerified collects and sells personal data that can put you at risk of spam — and scams. Follow this guide to remove your information for good.

What Is a Password Spraying Attack? (Risks and Warning Signs)
Hackers use password spraying attacks to take advantage of weak or common passwords and access your online accounts — unless you follow these safety tips.

Is Kroll Monitoring Legitimate? What You Need to Know
Kroll provides identity monitoring to customers of companies impacted by data breaches — but its lack of features could make you think twice before signing up.