Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Carding: The Fraud Technique Destroying Your Credit
Online shopping with your credit card is convenient. But can put you at risk of a type of fraud called carding. Learn how to protect yourself today.
text

Is It Safe To Link Bank Accounts? 7 Risks You Need To Know
Is it safe to link bank accounts to other apps and services? Get familiar with the risks to protect your finances from fraudsters.

How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.

What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.

How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.

What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.

Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?