Digital Security 101
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![An illustration of a scammer lurking behind a life-size SSN card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad90603147425ad9c32_6349b5518901924f36d3eb08_Social%2520Security%2520Scam%2520Call.png)
7 Signs of a Social Security Scam Call
Here’s what you need to know about Social Security scam calls and what to do if you realize you're on the phone with an SSA imposter.
![Vishing: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad6f4d1a5202b9caa33_6349b5934ad0b658b2e5d5b0_Vishing.png)
What is Vishing? How To Identify Phone Scams (15 Examples)
Vishing — when scammers call you and trick you into sending them money or information — is skyrocketing. Don’t fall for these 15 phone scams!
![What is a data breach - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad5fa12cafe97eb3d7e_6449a1d36d021bab7082f72f_What%2520is%2520a%2520Data%2520Breach.webp)
What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.
![How to read a credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae259b23a9d54e8baeb_64822589aba43676fa3f848c_How%2520to%2520Read%2520a%2520Credit%2520Report.webp)
How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.
![Illustration of an open briefcase full of money](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6531f88a25c357d31a_64821f1835c05c64b353b671_How%2520to%2520Protect%2520Against%2520Ransomware.png)
How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.
![How To Prove a Debt Is Not Yours - lead illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae3fa12cafe97eb4778_647fac2292d3fc734d93e357_How%2520to%2520Prove%2520a%2520Debt%2520is%2520Not%2520Yours.webp)
How To Prove a Debt Is Not Yours (and Dispute It)
Did you find a strange debt in your name? It could be a sign of identity theft. Learn how to prove a debt is not yours and protect yourself against fraud.
text
![An illustration of a key on a lock- and house-shaped keychain](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db48fb7590d493692d478_Deed%20Fraud.png)
6 Rental Scams: How To Tell If a Listing is Genuine
Rental scams target renters with fake listings, fraudulent leases, and more. Here’s how to avoid getting scammed while finding your next apartment or home.
![An illustration of an outstretched arm coming from a laptop screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab67c14c99d69324067b_63e25c1ac3738147709037a5_How-do-data-breaches-happen-header.png)
How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?
![An illustration of a radar interface on a tablet](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356d0d3a7a1479ab788d35d_What-is-Dark-Web-monitoring-header-image.png)
What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.
![An illustration showing a child scribbling on a life-size SSN card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadb6dfe8f4e72ff96f0_6384ca14101ed2100b5f8db5_How-to-replace-a-childs-ssn-card-header.png)
How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.
![An illustration of a hooded figure lurking behind an open laptop](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634da9c2eec357543a4025bc_crypto%20recovery%20service%20scams.png)
Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.
![An illustration of a life-size Social Security card and someone peeking over it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/639cd8ccec0d820eb4a11417_What%20to%20Do%20If%20Someone%20Has%20Your%20Social%20Security%20Number.png)
What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.