Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.

Stolen Phone? Don't Panic! Follow These 11 Steps Now
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.

How to Recover a Hacked Instagram Account [Step by Step]
Was your Instagram account hacked? Don’t panic. Follow this step-by-step guide on what to do if your Instagram is hacked and you’ve been locked out.

Can You Change Your Social Security Number? (How-To Guide)
Unfortunately, there are only a few, very specific situations where you'll be able to change your Social Security number (SSN).

The Dangers of Using Public Wi-Fi (and How To Stay Safe)
Public and unsecured Wi-Fi networks are convenient. But are they safe? Learn the 10 hidden dangers of unsecured and public Wi-Fi networks (and what to do).

Someone Claimed Unemployment in My Name. What Should I Do?
If scammers claim unemployment in your name, your bank account, credit, and identity could be at risk. Learn what to do to protect yourself.
text

How To Check for Viruses on Your Mac Right Now
You can manually check for viruses on your Mac using built-in tools — or use antivirus software that will dig deeper and root out the worst Mac viruses.

What To Do If You Receive a Data Breach Alert
A data breach alert tells you what information was leaked and provides guidance on how to stay safe — but there’s more you can do to protect yourself.

Is Your Phone Hacked? Follow These Steps Right Now
Using antivirus software, removing suspicious apps, and checking your app permissions, cache, and accounts can help you quickly shut down hackers.

How To Identify Fake Websites: 11 Warning Signs
Scammers build fake websites to steal your personal information, passwords, and money. Here’s how to identify fake websites before it's too late.

How To Check For Malware on Your Android Device Right Now
Android devices are typically more vulnerable to viruses and malware — luckily, you can scan for and delete malicious apps in a few quick steps.

Why It’s Important To Check Your Credit Reports (and How To Do It)
Your credit reports can bring to light early warning signs of fraud or errors that could impact your credit score — but only if you know where to look.