Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.

How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.

How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.

How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.

Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.

Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
text

Does a VPN Protect You From Viruses? (New for 2024)
A virtual private network (VPN) is an important part of your digital security setup — but it can’t completely protect you from viruses and malware.

How Is Mortgage Fraud Detected? 20 Types of Fraud To Know
Those who commit mortgage fraud may be subject to prosecution, either for “fraud for housing” or “fraud for profit.” Here’s how to spot them.

How To Avoid Reverse Mortgage Scams
Scammers target reverse mortgages to try and steal the equity in your home — or worse. Here’s how to know if you’re dealing with a reverse mortgage scam.

How To Protect Your Home Title From Deed Theft
Deed fraud is a devastating scam where criminals forge your identity and steal the title to your home. Protect yourself by knowing the red flags.

The 12 Latest Types of Social Engineering Attacks (2024)
Hackers use social engineering attacks to manipulate you into giving them what they want — passwords, data, and money. Here’s how to protect yourself.

How Do Parental Controls Work? Setting Up Devices at Home
Content filtering, screen time limits, and internet usage all fall under the parental controls umbrella. Here’s how to set these up across devices.