Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.

How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.

How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.

Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.

Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.

7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
text

How To Check for Viruses on Your Mac Right Now
You can manually check for viruses on your Mac using built-in tools — or use antivirus software that will dig deeper and root out the worst Mac viruses.

What To Do If You Receive a Data Breach Alert
A data breach alert tells you what information was leaked and provides guidance on how to stay safe — but there’s more you can do to protect yourself.

Is Your Phone Hacked? Follow These Steps Right Now
Using antivirus software, removing suspicious apps, and checking your app permissions, cache, and accounts can help you quickly shut down hackers.

How To Identify Fake Websites: 11 Warning Signs
Scammers build fake websites to steal your personal information, passwords, and money. Here’s how to identify fake websites before it's too late.

How To Check For Malware on Your Android Device Right Now
Android devices are typically more vulnerable to viruses and malware — luckily, you can scan for and delete malicious apps in a few quick steps.

Why It’s Important To Check Your Credit Reports (and How To Do It)
Your credit reports can bring to light early warning signs of fraud or errors that could impact your credit score — but only if you know where to look.