Digital Security 101
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![An illustration of a radar interface on a tablet](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356d0d3a7a1479ab788d35d_What-is-Dark-Web-monitoring-header-image.png)
What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.
![An illustration showing a child scribbling on a life-size SSN card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadb6dfe8f4e72ff96f0_6384ca14101ed2100b5f8db5_How-to-replace-a-childs-ssn-card-header.png)
How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.
![An illustration of a hooded figure lurking behind an open laptop](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634da9c2eec357543a4025bc_crypto%20recovery%20service%20scams.png)
Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.
![An illustration of a life-size Social Security card and someone peeking over it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/639cd8ccec0d820eb4a11417_What%20to%20Do%20If%20Someone%20Has%20Your%20Social%20Security%20Number.png)
What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.
![An illustration of a person trying to catch floating coins with a butterfly net](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63dad50b7c85d169f870b415_What-to-do-if-scammed-out-of-money-header.png)
What To Do If You’ve Been Scammed Out Of Money
Whether you’ve sent scammers gift cards, crypto, or cash, there’s still hope. Learn how to try and get your lost money back and prevent further fraud.
![An illustration of a credit card in a cloche](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadeffde397f4ad4f410_638698ac4b51e2282252f64e_lost-credit-card-what-to-do.png)
Lost Credit Card? Do This! (Even Before Replacing Your Card)
A lost credit card can quickly go from a minor annoyance to a serious issue. Learn what steps to take to protect yourself if your card goes missing.
text
![Illustration of a credit score tracker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/638640db9069187c4b3c1840_credit-lock-vs-credit-freeze-header.png)
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
![Stolen social security card: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c569aad0e676488a6175_Stolen%20Social%20Security%20Card.png)
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
![An illustration of a fraudulent FEMA contractor against a battered window](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69f2c95a0e129ae395_634dadbdd2c42670230fa380_FEMA%2520Scams.png)
7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
![An illustration of a laptop with a warning sign displayed on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab698080ba51971d567b_63a23a873853df4556214574_Emerging-cyber-threats-header-image.png)
The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.
![What to do if your phone is stolen.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c379ef1ff8ee37e54de1_Stolen%20Phone.png)
Stolen Phone? Don't Panic! Follow These 11 Steps Now
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.
![Illustration of a smartphone with the Instagram logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c3f2a8dfe5a61486bd62_How%20to%20Recover%20a%20Hacked%20Instagram%20Account.png)
How to Recover a Hacked Instagram Account [Step by Step]
Was your Instagram account hacked? Don’t panic. Follow this step-by-step guide on what to do if your Instagram is hacked and you’ve been locked out.