Digital Security 101

Showing results for:
text
No results found for:

text

Illustration of a thief stealing a larger-than-life key
Internet Security

What Is Credential Stuffing? (And How To Protect Yourself)

What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Read More
October 6, 2023
Illustration of what seems like an employee ID card with a question mark in place of a person’s photo
Identity Theft

Employment Identity Theft: How To Tell If You're a Victim

Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

Read More
October 6, 2023
Illustration of a child staring at an iPad with fingers and speech bubbles coming out of it
Family Safety

10 Warning Signs of Cyberbullying (& What To Do)

The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →

Read More
October 6, 2023
Illustration of a computer hard drive with a lock symbol on it to represent protecting your data
Internet Security

What To Do With Old Computers (Before Throwing Them Away)

Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.

Read More
October 5, 2023
Credit dispute letter - illustration
Credit & Finance

How To Write a Credit Dispute Letter (and Repair Your Credit)

A credit dispute letter can restore your credit score after identity fraud. Learn when to send the letter and what to include.

Read More
October 4, 2023
How to prevent SIM swapping: Header image
Fraud

How To Prevent SIM Swapping and Port-out Scams

A SIM card swap is a gateway fraud; scammers can easily hijack your phone number — and then steal your identity. Here’s how to prevent SIM swapping.

Read More
October 4, 2023

Try Aura—14 Days Free

Start your free trial today**