Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Someone Claimed Unemployment in My Name. What Should I Do?
If scammers claim unemployment in your name, your bank account, credit, and identity could be at risk. Learn what to do to protect yourself.

Fraud Alert vs. Credit Freeze: Which Is Better & How To Choose
Both tools can help protect your personal information and identity. But what’s the difference and when do you choose a fraud alert vs. a credit freeze?

What Is PPP Loan Fraud? How Scammers Stole $100+ Billion
PPP loan fraud has been called the largest fraud of all time with more than $100 billion stolen. But what is it exactly? And how does it put you in danger?

How to Lock Your Social Security Number for Free (Self Lock)
While there’s no one way to freeze your Social Security number (SSN), using a Self Lock or blocking electronic access can help secure it.

My Mother Stole My Identity
What would you do if your mom stole your identity? Here's how Axton Betz Hamilton dealt with an identity thief in her family.

Here's What To Do If Your Driver's License is Lost or Stolen
A stolen driver’s license is the key that opens you up to identity theft. If your ID is lost, stolen, or missing, act fast to secure your identity.
text

The 6 Best Credit Karma Alternatives (Reviewed and Ranked)
Credit Karma offers "free" credit monitoring and personal financial tools to millions of Americans — but it's not the only (or best) option available.

How Does Identity Theft Happen? (and How To Avoid It)
Fraudsters have more ways than ever to steal your identity. But by learning their scams, you can help keep your identity, finances, and family safe.

How To Block Apps on iPhones: What Parents Need To Know
Knowing how to block apps on iPhones is crucial to shielding kids from online threats such as smartphone addictions, scams, and cyberbullying.

How To Quickly Identify Phishing Emails (13 Red Flags)
Clicking on links or responding to phishing emails can put you at risk of identity theft, hacking, or fraud. Check for these red flags before you react.

Here’s How You Can Prevent Credit Card Cloning
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.

Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.