Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Fraud Alert vs. Credit Freeze: Which Is Better & How To Choose
Both tools can help protect your personal information and identity. But what’s the difference and when do you choose a fraud alert vs. a credit freeze?

What Is PPP Loan Fraud? How Scammers Stole $100+ Billion
PPP loan fraud has been called the largest fraud of all time with more than $100 billion stolen. But what is it exactly? And how does it put you in danger?

How to Lock Your Social Security Number for Free (Self Lock)
While there’s no one way to freeze your Social Security number (SSN), using a Self Lock or blocking electronic access can help secure it.

My Mother Stole My Identity
What would you do if your mom stole your identity? Here's how Axton Betz Hamilton dealt with an identity thief in her family.

Here's What To Do If Your Driver's License is Lost or Stolen
A stolen driver’s license is the key that opens you up to identity theft. If your ID is lost, stolen, or missing, act fast to secure your identity.
.png)
10 Common Types of Financial Fraud & Schemes (With Examples)
Identity thieves are almost only ever after one thing: your money. Here’s how to recognize signs of financial fraud and protect your money from scammers.
text

The 8 Best Spam Call Blocker Apps for Stopping Unwanted Calls
Phone scammers can bypass built-in and basic spam call blockers — but a new breed of AI-powered tools can finally protect you from non-stop spam calls.

How To Know If Your Phone Is Hacked (12 Warning Signs)
Signs of a hacked phone include reduced battery life, higher data usage, unusual device behavior, new apps, locked accounts, or receiving 2FA codes.

How To Know If a Recruiter Is Legit: 7 Recruitment Scam Red Flags
Fake recruiters prowl LinkedIn, post on Indeed, and reach out to victims with non-existent job offers — but you can spot them if you know what to look for.

Email Found on the Dark Web? Here’s How To Protect Yourself
If you’ve been part of a data breach, there’s a good chance that your email can be found on the Dark Web — but is this something you need to worry about?

The Easiest Ways To Prevent Identity Theft [8 Steps]
While it’s impossible to completely prevent all types of identity theft, you can make yourself a much less vulnerable target with a few protective measures.

How Long Does It Take To Recover From Identity Theft?
The time it will take to recover after your identity has been stolen will depend on what information was stolen, how it was used, and how quickly you act.