Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.

How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.

How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.

How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.

Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.

Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
text

Is It Safe To Link Bank Accounts? 7 Risks You Need To Know
Is it safe to link bank accounts to other apps and services? Get familiar with the risks to protect your finances from fraudsters.

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?