Your Guide to Online Safety
You have the power to stay safe online! Use our massive collection of resources to learn how to take control of your online life and find peace of mind in our interconnected world. We have hundreds of articles, videos, infographics, and more for you to learn from and share. Use our materials to raise awareness at home, work, school, or anywhere in your community!

How to Update Your Software
An easy way to boost your cybersecurity is to always keep software and apps updated.

What Is Phishing and How To Avoid It
Cybercriminals love to go phishing, but you don't have to get hooked.

How to Stop the Flow of Personal Data with Cloaked CEO Arjun Bhatnagar
It’s Data Privacy Week, when we pay special attention to why data privacy is so critical in today’s world.

Cybersecurity for Tax Season: Protect Your Identity and Refund
Tax season brings enough stress without adding scammers to the mix. But the reality is that criminals ramp up attacks in the first few months of the year, often impersonating the IRS or trusted services like H&R Block and TurboTax.

What is Multifactor Authentication (MFA) and Why Should You Use It?
You can protect your online accounts with more than just a password.

Stay Secure While Job Hunting
When looking for new opportunities, follow these simple steps to protect yourself from fraud.

Use Apps and Software to Protect Your Data
Our data is constantly collected and shared, and we often don't even know all the types of data being gathered.

Create and Use Strong Passwords
Passwords are the keys to safeguarding your digital and online life. They are your first line of defense. And knowing how to create and store strong passwords is one of the most critical aspects of everyday cybersecurity.

What is Data Privacy and Why Should You Care?
Data Privacy Week is January 27 - 31, 2025!

Cybersecurity Predictions for 2025: Challenges and Opportunities
The year 2024 was a whirlwind year for cybersecurity. From the fallout of high-profile ransomware attacks to the increasing commoditization of AI tools, the challenges kept mounting.

Chinese Telecom Hack: How to Protect Your Messages
Learn how to protect your calls and texts following the Chinese telecom cyberattack with simple tips like using encrypted apps.

How to Avoid Scams and Fraud
Online scams are becoming increasingly sophisticated, targeting people of all ages. But with some knowledge, you can protect yourself and your loved ones.

Avoid Gift Card Draining Scams This Holiday Season
Gift cards make for easy, versatile gifts, especially during the busy holiday season. But they’re also prime targets for scammers who use "gift card draining" to steal funds before the recipient can even use the card. Let’s break down how these scams work and how you can stay safe.

What is Pig Butchering and How to Spot the Scam
"Pig butchering" is a scam that's been muscling into the headlines lately.

Did Hackers Steal Every Social Security Number? Here's What To Do.
Learn how to protect your social security number.

Data Breaches Slim Down Your Wallet
Data breaches are becoming an expensive predicament for all of us, even if your data isn't directly stolen in a breach.

When Websites Make It Hard to Cancel...
Some websites and apps are designed to be manipulative – they make it hard to cancel a recurring subscription, obscure the fact that you will be charged, or hide the unsubscribe button.

Watch Out for EBT Scams
Scammers target some of the most vulnerable.

Protect Your Credit Cards from Skimmers and Shimmers
You can be a target of credit card skimming when you least expect it.

Backups
Our digital devices contain vast treasure troves of data, from family photos and music collections to financial data, health records and personal contacts.

When Scammers Call Grandma
"Your grandson has been arrested and needs bail money." "Your granddaughter was at fault in a car crash, and you need to pay the other driver's medical bills." What do you do if you receive these calls?

Don’t Scam Me Right Now, I’m Trying to Buy a Home
How scammers try to trick home buyers and sellers.

What To Do If Your Identity Is Stolen
With data breaches seemingly happening every week, more and more people are victims of identity theft.

5 Common Real Estate Scams You Need to Know About
Since every real estate transaction involves a significant sum of money, anyone in the home market today will likely run into scammers on the prowl.

Online Safety Basics
With a little prep, you can shield your information online and secure your digital systems and devices.

Securing Smart Speakers and Digital Assistants
Smart speakers and digital assistants like Amazon Echo, Google Nest, Apple HomePod, and Sonos Era are integral to many modern households.

How Data Breach Fatigue Can Impact Your Digital Health
When you hear your sensitive data was lost in another data breach, is exhaustion your first reaction?

Reporting Cybercrime
The first step toward bringing cybercriminals to justice is reporting cybercrime when it happens.

Manage Your Privacy Settings
Direct links to manage your privacy settings on popular platforms and apps.

How to Restore an MFA Authenticator App
Authenticator apps for multi-factor authentication (MFA) significantly enhance security but users must prepare for potential access loss due to device changes or loss by establishing recovery options and backups.

Getting Kids & Teens to Care about Cybersecurity
We all know Kids & Teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Getting Kids and Teens to Care about Cybersecurity
We all know kids and teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Guard your Gateway: Internet Router Tips
While internet routers aren't as flashy as the latest VR headset or electric truck, they make internet access in our homes and businesses possible.

SIM Card Swap Scams
Protect your phone from this increasingly common scam.

Spring Clean Your Online Life
A sloppy digital life can make your data harder to find and leaves your personal information vulnerable to bad actors. With a few steps, you can keep yourself and your family safe online with a squeaky clean digital life.

Protect Your Wallet from Accidental Deposit Scams
"I made a typo and accidentally sent you $3,000! Can you please send it back?"

Lessons from Data Privacy Week 2024
Data is now a valuable commodity.

Avoiding Voting Scams and Safeguarding Elections
Elections are a cornerstone of American society. However, there are bad actors who don't respect the sanctity of our voting process.

Protecting Our Kids' Data Privacy is Paramount
Protecting our children's online data is of utmost importance.

Connected Car Cybersecurity: Drive Safe Online
Cars have joined the Internet of Things, and with any connected device, you should follow some security best practices to keep your car's system safe.

Safeguarding Your Internet Activity with Incognito Mode
We'll explore how incognito mode works, how it can help protect your browsing data, and, importantly, ways it isn't a magic solution to all your privacy concerns.

How to Protect Yourself Against Deepfakes
Deepfake technologies can be used to steal your identity even if you don’t use generative AI platforms.

What to Know About Stalkerware
Even though the use of stalkerware to spy on adults is against the law, these duplicitous bits of code still pop up on app stores.

How to Take Back Control of a Social Media Account
Responding to social media account takeover.

Traveling Securely: A Comprehensive Guide to Protecting Your Digital Footprint While on the Move
Technology accompanies us everywhere these days, and that includes traveling for work. Cybersecurity remains paramount even when you are thousands of miles away from the office.

The Benefits of Using a Random Password Generator for Safer Online Access
One way to ensure your passwords are awesome is by using random password generators, often included with password managers.

Extra! Extra! Avoid Fake News!
What is Misinformation, Disinformation, and Malinformation?

Securing Higher Ed: 5 Tips for Learning Safe Online
Technology and academia are now seamlessly intertwined. While tech can further educational opportunities for students, it also comes with risk as the ivory tower delves into the Wild West of the internet.

Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023
STUDY: 37% Intimidated, 39% Frustrated with Online Security Highlighting Digital Anxiety

Don't Blame the Victim: 'Fraud Shame' and Cybersecurity
There is often a culture of blaming fraud victims for their predicament, rather than focusing on the criminal and the crime.

How Your Phone Number is Exposed: Phone Number Leaks
Your phone number counts as personal data, and you don't just want anyone out on the internet to have it.

K-12 Cybersecurity: Keep Kids Secure from Kindergarten to Graduation
Nowadays, kids aren't just polishing apples and stuffing their bookbags before heading to school, they're firing up laptops and using video chat with their teachers.

Share with Care: Staying Safe on Social Media
Hey, friends, followers, lurkers, and posters: you don't have to overshare!

Pull the Shades Down on Your Browsing With a VPN
Did you know that your cruise around the internet every day might not be totally private?

What To Do When Your Data Is Breached
Oh no! You’ve been notified that your sensitive information has been stolen in a data breach.

What LGBTQ+ Communities Should Know About Online Safety
The internet is now crucial for connecting LGBTQ+ people and communities across the globe, but how can you hone your cybersecurity and protect your privacy?

Google Users: Fire Up Google Passkeys
In May 2023, Google announced it was launching a new login system called "passkeys."

Will Passwords Become a Thing of the Past?
What to know about passwordless authentication and passkeys.

Parenting in the Digital Age: 7 Online Dating Rules for Your Teens
Parenting in our always-connected world comes with new challenges, new learning curves, and new awkward moments.

Think Intelligent About Artificial Intelligence
Artificial intelligence, including so-called “large language models” like ChatGPT, has rapidly become a major talking point in the press, amongst governments, and maybe even in your office!

Hacked Accounts: What to Do Right Now
If an online account has been hacked, it's important to act fast.

Wedding Planning Cybersecurity: Say "I Do!" to Digital Bliss
Congrats on your nuptials! We have a few tips for keeping your Big Day secure.

Why Identity Management Matters to You
Do you worry about the security of your personal data in our digital age?

Stay Secure While You Work From Home
Remote work seems like it is here to stay for many of us even as the COVID-19 pandemic recedes in our collective rearview mirror.

What We're Leaning About Data Privacy in 2023
We are living in an incredible time in history – a time when advancements in technology are creating tools that will help solve society’s greatest challenges and fuel the next wave of innovation.

How to Tell If Your Computer Has a Virus and What to Do About It
Computer viruses make your devices sick, but you can usually help them heal if you act fast.

Avoid Search Engine Ad Malware!
It's a new year and already there is a type of scam becoming extremely popular with hackers.

Online Romance and Dating Scams
Love is in the air and online, but so are cybercriminals

Public Computers and Wi-Fi
Surf safe when using public computers and networks.

What to Do if Your Password Manager Is Breached
What should you do if your password manager is breached?

What Is Data Privacy?
When you think of privacy, what comes to mind? Closing your window shades? Keeping your phone screen locked? Shutting the door when you have a sensitive conversation?

10 Online Safety Tips for Gaming
Play safe while gaming.

Dongles, Sticks, Drives, and Keys: What to Know About Removable Media
If you find a USB drive or other removable piece of media in the wild, DO NOT plug it into your computer! Let's break down why.

How to Be an Online Privacy Snob
Take control of the data you share by being picky.

Securing Your Home Network
A protected home network shuts out cybercriminals, allowing your family to use the internet more safely.

Online Shopping
Online shopping may be convenient but it can present many opportunities for scammers and cybercriminals.

Take Control of Your Data
All your online activity generates a trail of data.

Only half of teens agree they "feel supported online" by parents
Not enough children and teenagers trust their parents to support them online, and not enough parents know exactly how to give the support their children need.

What About Password Manager Risks?
In the new Password Policy ebook, What Your Password Policy Should Be, KnowBe4 recommends that all users use a password manager to create and use perfectly random passwords.

‘It’s easy to stay safe online’ with these 4 steps (plus 1)
When it comes to cybersecurity, good behavior can be rewarding.

Raising Digital Citizens
We all know the internet is a fantastic world of learning and entertainment for kids, but, like the real world, there can be dangers, too.

Best Practices for Security and Privacy Settings
Want to lead a Stay Safe Online lifestyle, but don't know where to start?

Password Managers
Don't pass on password managers. Learn more about these useful tools.

You Can Stop Cyberbullying As A Kid!
As a kid using the internet, you've probably heard of cyberbullying. Maybe you or a friend has experienced it.

The Modern Teen’s Guide to Handing Out L’s to Cyberbullies
Cyberbullying can make you feel like you can't really be "you" online. Here's what to do.

Parents and Educators: What to Do About Cyberbullying
Have you ever texted or posted something online that you would never say to someone in person? You’ve probably experienced how the internet's anonymous nature can sometimes bring out the worst in people.

10 Must-Know Tips For Keeping Your Personal Data Safe
The internet has become a vital aspect of our lives.

Secure Your Home
Internet-connected devices are helping homeowners increase efficiency, reduce costs, conserve energy and a whole host of other benefits.

Respect Privacy
Respecting the privacy of your customers, staff, and all other stakeholders is critical for inspiring trust and enhancing reputation.

Talking to Kids & Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

Online Safety Tips For Older Adults
Just as you fasten your seat belt before driving, take precautions before using the Internet to be sure you are safe and secure.

Parental Controls
As a parent, how do you stay involved in your child’s digital life?

Talking to Kids and Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

COVID-19 Security Resource Library
Free resources to help individuals and organizations through the COVID-19 pandemic.

Malware, Viruses and Botnets
These 3 types of cybercriminal tools are common online, and you as an internet user might come across them from time to time.

Security Awareness Episodes
Watch and download this fun series on security best practices!

Is working on your smartphone a risky business or are you cybersecure?
The increasing use of mobile devices in our personal lives has led to a growing acceptance of smartphone usage at work.

Stalkerware
BEFORE YOU CONTINUE: Stalkerware apps can track your browsing history so if you suspect that stalkerware has been installed on your device DO NOT USE IT to research support services such as advocacy, shelter, court information or emergency services.

Tips for Higher Education Online Teaching and Learning
As online and hybrid learning environments become more popular, it is essential for students, faculty, and staff to adopt key cybersecurity practices.

K-12 Online Learning
Online learning is here to stay. Many K-12 schools will probably use some blend of fully online learning and in-person teaching for the foreseeable future.

Mobile Devices
That smartphone in your pocket, that tablet on your coffee table or that laptop on your desk contains a treasure chest of information about you, your friends and your family.

A Teacher’s Guide To Student Online Safety
Students are more connected than ever before thanks to the internet.

7 Tips for a Safer Internet of Things
The "Internet of Things" (IoT) has been a realm of technological innovation that has grown exponentially over the past decade.

Be Cyber Smart: A guide to help you do your part
Let’s brush up on cyber hygiene — basic steps we can take to stay safe in a connected world.

Reporting Matters – even for a Smishing Message
With the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your sensitive information.

7 Tips to Manage Your Identity and Protect Your Privacy Online
Worried about how much of your private information is on the internet and vulnerable to theft or misuse? You’re not alone.

Spotting a Vaccine Phishing Scam: Can You Find the Red Flags?
Many of us have seen COVID-related scams hit our inboxes. It’s no secret that scammers try to take advantage of times of panic and uncertainty, when people are most vulnerable, to steal personal information.

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
When we're online, we accumulate a significant amount of personally identifiable information (PII), which can be exploited by cybercriminals.

Security Awareness: Episode 4 – Phishing and Ransomware
We’re bringing you another free security awareness video! These videos are brought to you by Adobe, National Cyber Security Alliance, and Speechless Inc.

Owning Your Privacy by Managing Your Digital Footprint
The information you share online can reveal more details then you intend and make you vulnerable to compromise.

How to Secure and Maintain Your Digital Identity
Individuals must take proactive steps to safeguard their digital identities by being cautious about personal information sharing, connection requests, and message links.

Sextortion: What to Look Out For and What to Do If You’re a Victim
An explanation of sextortion and how it works.

The Secret Language of Emoji
Emoji appeared in 1999 with a set of 176 symbols that were meant to convey weather, traffic, technology and time. Today, there are 2,823 emoji that convey information across language, culture, lifestyle and diversity.

Stay Secure On Public Wi-Fi When Traveling
Twink twice before connecting to a public wi-fi network when you're on the go.

Protecting Baby Monitors From Hacking
The use of Wi-Fi-capable baby monitors has become indispensable to many parents.

Security and Privacy Tips for Cryptocurrency Holders
The cryptocurrency trend is definitely a big boom in today’s financial market.

Data Privacy Is Crucial for the LGBT Community
It is vitally important to consider how compromised online privacy can specifically affect marginalized groups such as the LGBT community.

Health Technology in the Digital Era – Benefits + Risks
Examining the evolution of health technologies and their implications for patient privacy and security.

Health Information Privacy – Why Should We Care?
Recent data breaches involving health information pose significant risks to our online privacy. Learn how to protect your valuable health data.

15 Online Security + Privacy Tips for College Students
You’re responsible for your own online security at college, so follow these tips to help you be safe and privacy-savvy on campus.

How to Update Your Software
An easy way to boost your cybersecurity is to always keep software and apps updated.

What Is Phishing and How To Avoid It
Cybercriminals love to go phishing, but you don't have to get hooked.

How to Stop the Flow of Personal Data with Cloaked CEO Arjun Bhatnagar
It’s Data Privacy Week, when we pay special attention to why data privacy is so critical in today’s world.

Cybersecurity for Tax Season: Protect Your Identity and Refund
Tax season brings enough stress without adding scammers to the mix. But the reality is that criminals ramp up attacks in the first few months of the year, often impersonating the IRS or trusted services like H&R Block and TurboTax.

What is Multifactor Authentication (MFA) and Why Should You Use It?
You can protect your online accounts with more than just a password.

Stay Secure While Job Hunting
When looking for new opportunities, follow these simple steps to protect yourself from fraud.

Use Apps and Software to Protect Your Data
Our data is constantly collected and shared, and we often don't even know all the types of data being gathered.

Create and Use Strong Passwords
Passwords are the keys to safeguarding your digital and online life. They are your first line of defense. And knowing how to create and store strong passwords is one of the most critical aspects of everyday cybersecurity.

What is Data Privacy and Why Should You Care?
Data Privacy Week is January 27 - 31, 2025!

Cybersecurity Predictions for 2025: Challenges and Opportunities
The year 2024 was a whirlwind year for cybersecurity. From the fallout of high-profile ransomware attacks to the increasing commoditization of AI tools, the challenges kept mounting.

Chinese Telecom Hack: How to Protect Your Messages
Learn how to protect your calls and texts following the Chinese telecom cyberattack with simple tips like using encrypted apps.

How to Avoid Scams and Fraud
Online scams are becoming increasingly sophisticated, targeting people of all ages. But with some knowledge, you can protect yourself and your loved ones.

Avoid Gift Card Draining Scams This Holiday Season
Gift cards make for easy, versatile gifts, especially during the busy holiday season. But they’re also prime targets for scammers who use "gift card draining" to steal funds before the recipient can even use the card. Let’s break down how these scams work and how you can stay safe.

What is Pig Butchering and How to Spot the Scam
"Pig butchering" is a scam that's been muscling into the headlines lately.

Did Hackers Steal Every Social Security Number? Here's What To Do.
Learn how to protect your social security number.

Data Breaches Slim Down Your Wallet
Data breaches are becoming an expensive predicament for all of us, even if your data isn't directly stolen in a breach.

When Websites Make It Hard to Cancel...
Some websites and apps are designed to be manipulative – they make it hard to cancel a recurring subscription, obscure the fact that you will be charged, or hide the unsubscribe button.

Watch Out for EBT Scams
Scammers target some of the most vulnerable.

Protect Your Credit Cards from Skimmers and Shimmers
You can be a target of credit card skimming when you least expect it.

Backups
Our digital devices contain vast treasure troves of data, from family photos and music collections to financial data, health records and personal contacts.

When Scammers Call Grandma
"Your grandson has been arrested and needs bail money." "Your granddaughter was at fault in a car crash, and you need to pay the other driver's medical bills." What do you do if you receive these calls?

Don’t Scam Me Right Now, I’m Trying to Buy a Home
How scammers try to trick home buyers and sellers.

What To Do If Your Identity Is Stolen
With data breaches seemingly happening every week, more and more people are victims of identity theft.

5 Common Real Estate Scams You Need to Know About
Since every real estate transaction involves a significant sum of money, anyone in the home market today will likely run into scammers on the prowl.

Online Safety Basics
With a little prep, you can shield your information online and secure your digital systems and devices.

Securing Smart Speakers and Digital Assistants
Smart speakers and digital assistants like Amazon Echo, Google Nest, Apple HomePod, and Sonos Era are integral to many modern households.

How Data Breach Fatigue Can Impact Your Digital Health
When you hear your sensitive data was lost in another data breach, is exhaustion your first reaction?

Reporting Cybercrime
The first step toward bringing cybercriminals to justice is reporting cybercrime when it happens.

Manage Your Privacy Settings
Direct links to manage your privacy settings on popular platforms and apps.

How to Restore an MFA Authenticator App
Authenticator apps for multi-factor authentication (MFA) significantly enhance security but users must prepare for potential access loss due to device changes or loss by establishing recovery options and backups.

Getting Kids & Teens to Care about Cybersecurity
We all know Kids & Teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Getting Kids and Teens to Care about Cybersecurity
We all know kids and teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Guard your Gateway: Internet Router Tips
While internet routers aren't as flashy as the latest VR headset or electric truck, they make internet access in our homes and businesses possible.

SIM Card Swap Scams
Protect your phone from this increasingly common scam.

Spring Clean Your Online Life
A sloppy digital life can make your data harder to find and leaves your personal information vulnerable to bad actors. With a few steps, you can keep yourself and your family safe online with a squeaky clean digital life.

Protect Your Wallet from Accidental Deposit Scams
"I made a typo and accidentally sent you $3,000! Can you please send it back?"

Lessons from Data Privacy Week 2024
Data is now a valuable commodity.

Avoiding Voting Scams and Safeguarding Elections
Elections are a cornerstone of American society. However, there are bad actors who don't respect the sanctity of our voting process.

Protecting Our Kids' Data Privacy is Paramount
Protecting our children's online data is of utmost importance.

Connected Car Cybersecurity: Drive Safe Online
Cars have joined the Internet of Things, and with any connected device, you should follow some security best practices to keep your car's system safe.

Safeguarding Your Internet Activity with Incognito Mode
We'll explore how incognito mode works, how it can help protect your browsing data, and, importantly, ways it isn't a magic solution to all your privacy concerns.

How to Protect Yourself Against Deepfakes
Deepfake technologies can be used to steal your identity even if you don’t use generative AI platforms.

What to Know About Stalkerware
Even though the use of stalkerware to spy on adults is against the law, these duplicitous bits of code still pop up on app stores.

How to Take Back Control of a Social Media Account
Responding to social media account takeover.

Traveling Securely: A Comprehensive Guide to Protecting Your Digital Footprint While on the Move
Technology accompanies us everywhere these days, and that includes traveling for work. Cybersecurity remains paramount even when you are thousands of miles away from the office.

The Benefits of Using a Random Password Generator for Safer Online Access
One way to ensure your passwords are awesome is by using random password generators, often included with password managers.

Extra! Extra! Avoid Fake News!
What is Misinformation, Disinformation, and Malinformation?

Securing Higher Ed: 5 Tips for Learning Safe Online
Technology and academia are now seamlessly intertwined. While tech can further educational opportunities for students, it also comes with risk as the ivory tower delves into the Wild West of the internet.

Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023
STUDY: 37% Intimidated, 39% Frustrated with Online Security Highlighting Digital Anxiety

Don't Blame the Victim: 'Fraud Shame' and Cybersecurity
There is often a culture of blaming fraud victims for their predicament, rather than focusing on the criminal and the crime.

How Your Phone Number is Exposed: Phone Number Leaks
Your phone number counts as personal data, and you don't just want anyone out on the internet to have it.

K-12 Cybersecurity: Keep Kids Secure from Kindergarten to Graduation
Nowadays, kids aren't just polishing apples and stuffing their bookbags before heading to school, they're firing up laptops and using video chat with their teachers.

Share with Care: Staying Safe on Social Media
Hey, friends, followers, lurkers, and posters: you don't have to overshare!

Pull the Shades Down on Your Browsing With a VPN
Did you know that your cruise around the internet every day might not be totally private?

What To Do When Your Data Is Breached
Oh no! You’ve been notified that your sensitive information has been stolen in a data breach.

What LGBTQ+ Communities Should Know About Online Safety
The internet is now crucial for connecting LGBTQ+ people and communities across the globe, but how can you hone your cybersecurity and protect your privacy?

Google Users: Fire Up Google Passkeys
In May 2023, Google announced it was launching a new login system called "passkeys."

Will Passwords Become a Thing of the Past?
What to know about passwordless authentication and passkeys.

Parenting in the Digital Age: 7 Online Dating Rules for Your Teens
Parenting in our always-connected world comes with new challenges, new learning curves, and new awkward moments.

Think Intelligent About Artificial Intelligence
Artificial intelligence, including so-called “large language models” like ChatGPT, has rapidly become a major talking point in the press, amongst governments, and maybe even in your office!

Hacked Accounts: What to Do Right Now
If an online account has been hacked, it's important to act fast.

Wedding Planning Cybersecurity: Say "I Do!" to Digital Bliss
Congrats on your nuptials! We have a few tips for keeping your Big Day secure.

Why Identity Management Matters to You
Do you worry about the security of your personal data in our digital age?

Stay Secure While You Work From Home
Remote work seems like it is here to stay for many of us even as the COVID-19 pandemic recedes in our collective rearview mirror.

What We're Leaning About Data Privacy in 2023
We are living in an incredible time in history – a time when advancements in technology are creating tools that will help solve society’s greatest challenges and fuel the next wave of innovation.

How to Tell If Your Computer Has a Virus and What to Do About It
Computer viruses make your devices sick, but you can usually help them heal if you act fast.

Avoid Search Engine Ad Malware!
It's a new year and already there is a type of scam becoming extremely popular with hackers.

Online Romance and Dating Scams
Love is in the air and online, but so are cybercriminals

Public Computers and Wi-Fi
Surf safe when using public computers and networks.

What to Do if Your Password Manager Is Breached
What should you do if your password manager is breached?

What Is Data Privacy?
When you think of privacy, what comes to mind? Closing your window shades? Keeping your phone screen locked? Shutting the door when you have a sensitive conversation?

10 Online Safety Tips for Gaming
Play safe while gaming.

Dongles, Sticks, Drives, and Keys: What to Know About Removable Media
If you find a USB drive or other removable piece of media in the wild, DO NOT plug it into your computer! Let's break down why.

How to Be an Online Privacy Snob
Take control of the data you share by being picky.

Securing Your Home Network
A protected home network shuts out cybercriminals, allowing your family to use the internet more safely.

Online Shopping
Online shopping may be convenient but it can present many opportunities for scammers and cybercriminals.

Take Control of Your Data
All your online activity generates a trail of data.

Only half of teens agree they "feel supported online" by parents
Not enough children and teenagers trust their parents to support them online, and not enough parents know exactly how to give the support their children need.

What About Password Manager Risks?
In the new Password Policy ebook, What Your Password Policy Should Be, KnowBe4 recommends that all users use a password manager to create and use perfectly random passwords.

‘It’s easy to stay safe online’ with these 4 steps (plus 1)
When it comes to cybersecurity, good behavior can be rewarding.

Raising Digital Citizens
We all know the internet is a fantastic world of learning and entertainment for kids, but, like the real world, there can be dangers, too.

Best Practices for Security and Privacy Settings
Want to lead a Stay Safe Online lifestyle, but don't know where to start?

Password Managers
Don't pass on password managers. Learn more about these useful tools.

You Can Stop Cyberbullying As A Kid!
As a kid using the internet, you've probably heard of cyberbullying. Maybe you or a friend has experienced it.

The Modern Teen’s Guide to Handing Out L’s to Cyberbullies
Cyberbullying can make you feel like you can't really be "you" online. Here's what to do.

Parents and Educators: What to Do About Cyberbullying
Have you ever texted or posted something online that you would never say to someone in person? You’ve probably experienced how the internet's anonymous nature can sometimes bring out the worst in people.

10 Must-Know Tips For Keeping Your Personal Data Safe
The internet has become a vital aspect of our lives.

Secure Your Home
Internet-connected devices are helping homeowners increase efficiency, reduce costs, conserve energy and a whole host of other benefits.

Respect Privacy
Respecting the privacy of your customers, staff, and all other stakeholders is critical for inspiring trust and enhancing reputation.

Talking to Kids & Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

Online Safety Tips For Older Adults
Just as you fasten your seat belt before driving, take precautions before using the Internet to be sure you are safe and secure.

Parental Controls
As a parent, how do you stay involved in your child’s digital life?

Talking to Kids and Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

COVID-19 Security Resource Library
Free resources to help individuals and organizations through the COVID-19 pandemic.

Malware, Viruses and Botnets
These 3 types of cybercriminal tools are common online, and you as an internet user might come across them from time to time.

Security Awareness Episodes
Watch and download this fun series on security best practices!

Is working on your smartphone a risky business or are you cybersecure?
The increasing use of mobile devices in our personal lives has led to a growing acceptance of smartphone usage at work.

Stalkerware
BEFORE YOU CONTINUE: Stalkerware apps can track your browsing history so if you suspect that stalkerware has been installed on your device DO NOT USE IT to research support services such as advocacy, shelter, court information or emergency services.

Tips for Higher Education Online Teaching and Learning
As online and hybrid learning environments become more popular, it is essential for students, faculty, and staff to adopt key cybersecurity practices.

K-12 Online Learning
Online learning is here to stay. Many K-12 schools will probably use some blend of fully online learning and in-person teaching for the foreseeable future.

Mobile Devices
That smartphone in your pocket, that tablet on your coffee table or that laptop on your desk contains a treasure chest of information about you, your friends and your family.

A Teacher’s Guide To Student Online Safety
Students are more connected than ever before thanks to the internet.

7 Tips for a Safer Internet of Things
The "Internet of Things" (IoT) has been a realm of technological innovation that has grown exponentially over the past decade.

Be Cyber Smart: A guide to help you do your part
Let’s brush up on cyber hygiene — basic steps we can take to stay safe in a connected world.

Reporting Matters – even for a Smishing Message
With the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your sensitive information.

7 Tips to Manage Your Identity and Protect Your Privacy Online
Worried about how much of your private information is on the internet and vulnerable to theft or misuse? You’re not alone.

Spotting a Vaccine Phishing Scam: Can You Find the Red Flags?
Many of us have seen COVID-related scams hit our inboxes. It’s no secret that scammers try to take advantage of times of panic and uncertainty, when people are most vulnerable, to steal personal information.

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
When we're online, we accumulate a significant amount of personally identifiable information (PII), which can be exploited by cybercriminals.

Security Awareness: Episode 4 – Phishing and Ransomware
We’re bringing you another free security awareness video! These videos are brought to you by Adobe, National Cyber Security Alliance, and Speechless Inc.

Owning Your Privacy by Managing Your Digital Footprint
The information you share online can reveal more details then you intend and make you vulnerable to compromise.

How to Secure and Maintain Your Digital Identity
Individuals must take proactive steps to safeguard their digital identities by being cautious about personal information sharing, connection requests, and message links.

Sextortion: What to Look Out For and What to Do If You’re a Victim
An explanation of sextortion and how it works.

The Secret Language of Emoji
Emoji appeared in 1999 with a set of 176 symbols that were meant to convey weather, traffic, technology and time. Today, there are 2,823 emoji that convey information across language, culture, lifestyle and diversity.

Stay Secure On Public Wi-Fi When Traveling
Twink twice before connecting to a public wi-fi network when you're on the go.

Protecting Baby Monitors From Hacking
The use of Wi-Fi-capable baby monitors has become indispensable to many parents.

Security and Privacy Tips for Cryptocurrency Holders
The cryptocurrency trend is definitely a big boom in today’s financial market.

Data Privacy Is Crucial for the LGBT Community
It is vitally important to consider how compromised online privacy can specifically affect marginalized groups such as the LGBT community.

Health Technology in the Digital Era – Benefits + Risks
Examining the evolution of health technologies and their implications for patient privacy and security.

Health Information Privacy – Why Should We Care?
Recent data breaches involving health information pose significant risks to our online privacy. Learn how to protect your valuable health data.

15 Online Security + Privacy Tips for College Students
You’re responsible for your own online security at college, so follow these tips to help you be safe and privacy-savvy on campus.

How to Update Your Software
An easy way to boost your cybersecurity is to always keep software and apps updated.

What Is Phishing and How To Avoid It
Cybercriminals love to go phishing, but you don't have to get hooked.

How to Stop the Flow of Personal Data with Cloaked CEO Arjun Bhatnagar
It’s Data Privacy Week, when we pay special attention to why data privacy is so critical in today’s world.

Cybersecurity for Tax Season: Protect Your Identity and Refund
Tax season brings enough stress without adding scammers to the mix. But the reality is that criminals ramp up attacks in the first few months of the year, often impersonating the IRS or trusted services like H&R Block and TurboTax.

What is Multifactor Authentication (MFA) and Why Should You Use It?
You can protect your online accounts with more than just a password.

Stay Secure While Job Hunting
When looking for new opportunities, follow these simple steps to protect yourself from fraud.

Use Apps and Software to Protect Your Data
Our data is constantly collected and shared, and we often don't even know all the types of data being gathered.

Create and Use Strong Passwords
Passwords are the keys to safeguarding your digital and online life. They are your first line of defense. And knowing how to create and store strong passwords is one of the most critical aspects of everyday cybersecurity.

What is Data Privacy and Why Should You Care?
Data Privacy Week is January 27 - 31, 2025!

Cybersecurity Predictions for 2025: Challenges and Opportunities
The year 2024 was a whirlwind year for cybersecurity. From the fallout of high-profile ransomware attacks to the increasing commoditization of AI tools, the challenges kept mounting.

Chinese Telecom Hack: How to Protect Your Messages
Learn how to protect your calls and texts following the Chinese telecom cyberattack with simple tips like using encrypted apps.

How to Avoid Scams and Fraud
Online scams are becoming increasingly sophisticated, targeting people of all ages. But with some knowledge, you can protect yourself and your loved ones.

Avoid Gift Card Draining Scams This Holiday Season
Gift cards make for easy, versatile gifts, especially during the busy holiday season. But they’re also prime targets for scammers who use "gift card draining" to steal funds before the recipient can even use the card. Let’s break down how these scams work and how you can stay safe.

What is Pig Butchering and How to Spot the Scam
"Pig butchering" is a scam that's been muscling into the headlines lately.

Did Hackers Steal Every Social Security Number? Here's What To Do.
Learn how to protect your social security number.

Data Breaches Slim Down Your Wallet
Data breaches are becoming an expensive predicament for all of us, even if your data isn't directly stolen in a breach.

When Websites Make It Hard to Cancel...
Some websites and apps are designed to be manipulative – they make it hard to cancel a recurring subscription, obscure the fact that you will be charged, or hide the unsubscribe button.

Watch Out for EBT Scams
Scammers target some of the most vulnerable.

Protect Your Credit Cards from Skimmers and Shimmers
You can be a target of credit card skimming when you least expect it.

Backups
Our digital devices contain vast treasure troves of data, from family photos and music collections to financial data, health records and personal contacts.

When Scammers Call Grandma
"Your grandson has been arrested and needs bail money." "Your granddaughter was at fault in a car crash, and you need to pay the other driver's medical bills." What do you do if you receive these calls?

Don’t Scam Me Right Now, I’m Trying to Buy a Home
How scammers try to trick home buyers and sellers.

What To Do If Your Identity Is Stolen
With data breaches seemingly happening every week, more and more people are victims of identity theft.

5 Common Real Estate Scams You Need to Know About
Since every real estate transaction involves a significant sum of money, anyone in the home market today will likely run into scammers on the prowl.

Online Safety Basics
With a little prep, you can shield your information online and secure your digital systems and devices.

Securing Smart Speakers and Digital Assistants
Smart speakers and digital assistants like Amazon Echo, Google Nest, Apple HomePod, and Sonos Era are integral to many modern households.

How Data Breach Fatigue Can Impact Your Digital Health
When you hear your sensitive data was lost in another data breach, is exhaustion your first reaction?

Reporting Cybercrime
The first step toward bringing cybercriminals to justice is reporting cybercrime when it happens.

Manage Your Privacy Settings
Direct links to manage your privacy settings on popular platforms and apps.

How to Restore an MFA Authenticator App
Authenticator apps for multi-factor authentication (MFA) significantly enhance security but users must prepare for potential access loss due to device changes or loss by establishing recovery options and backups.

Getting Kids & Teens to Care about Cybersecurity
We all know Kids & Teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Getting Kids and Teens to Care about Cybersecurity
We all know kids and teens today spend a lot of time online, but that doesn't necessarily mean they know how to stay safe.

Guard your Gateway: Internet Router Tips
While internet routers aren't as flashy as the latest VR headset or electric truck, they make internet access in our homes and businesses possible.

SIM Card Swap Scams
Protect your phone from this increasingly common scam.

Spring Clean Your Online Life
A sloppy digital life can make your data harder to find and leaves your personal information vulnerable to bad actors. With a few steps, you can keep yourself and your family safe online with a squeaky clean digital life.

Protect Your Wallet from Accidental Deposit Scams
"I made a typo and accidentally sent you $3,000! Can you please send it back?"

Lessons from Data Privacy Week 2024
Data is now a valuable commodity.

Avoiding Voting Scams and Safeguarding Elections
Elections are a cornerstone of American society. However, there are bad actors who don't respect the sanctity of our voting process.

Protecting Our Kids' Data Privacy is Paramount
Protecting our children's online data is of utmost importance.

Connected Car Cybersecurity: Drive Safe Online
Cars have joined the Internet of Things, and with any connected device, you should follow some security best practices to keep your car's system safe.

Safeguarding Your Internet Activity with Incognito Mode
We'll explore how incognito mode works, how it can help protect your browsing data, and, importantly, ways it isn't a magic solution to all your privacy concerns.

How to Protect Yourself Against Deepfakes
Deepfake technologies can be used to steal your identity even if you don’t use generative AI platforms.

What to Know About Stalkerware
Even though the use of stalkerware to spy on adults is against the law, these duplicitous bits of code still pop up on app stores.

How to Take Back Control of a Social Media Account
Responding to social media account takeover.

Traveling Securely: A Comprehensive Guide to Protecting Your Digital Footprint While on the Move
Technology accompanies us everywhere these days, and that includes traveling for work. Cybersecurity remains paramount even when you are thousands of miles away from the office.

The Benefits of Using a Random Password Generator for Safer Online Access
One way to ensure your passwords are awesome is by using random password generators, often included with password managers.

Extra! Extra! Avoid Fake News!
What is Misinformation, Disinformation, and Malinformation?

Securing Higher Ed: 5 Tips for Learning Safe Online
Technology and academia are now seamlessly intertwined. While tech can further educational opportunities for students, it also comes with risk as the ivory tower delves into the Wild West of the internet.

Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023
STUDY: 37% Intimidated, 39% Frustrated with Online Security Highlighting Digital Anxiety

Don't Blame the Victim: 'Fraud Shame' and Cybersecurity
There is often a culture of blaming fraud victims for their predicament, rather than focusing on the criminal and the crime.

How Your Phone Number is Exposed: Phone Number Leaks
Your phone number counts as personal data, and you don't just want anyone out on the internet to have it.

K-12 Cybersecurity: Keep Kids Secure from Kindergarten to Graduation
Nowadays, kids aren't just polishing apples and stuffing their bookbags before heading to school, they're firing up laptops and using video chat with their teachers.

Share with Care: Staying Safe on Social Media
Hey, friends, followers, lurkers, and posters: you don't have to overshare!

Pull the Shades Down on Your Browsing With a VPN
Did you know that your cruise around the internet every day might not be totally private?

What To Do When Your Data Is Breached
Oh no! You’ve been notified that your sensitive information has been stolen in a data breach.

What LGBTQ+ Communities Should Know About Online Safety
The internet is now crucial for connecting LGBTQ+ people and communities across the globe, but how can you hone your cybersecurity and protect your privacy?

Google Users: Fire Up Google Passkeys
In May 2023, Google announced it was launching a new login system called "passkeys."

Will Passwords Become a Thing of the Past?
What to know about passwordless authentication and passkeys.

Parenting in the Digital Age: 7 Online Dating Rules for Your Teens
Parenting in our always-connected world comes with new challenges, new learning curves, and new awkward moments.

Think Intelligent About Artificial Intelligence
Artificial intelligence, including so-called “large language models” like ChatGPT, has rapidly become a major talking point in the press, amongst governments, and maybe even in your office!

Hacked Accounts: What to Do Right Now
If an online account has been hacked, it's important to act fast.

Wedding Planning Cybersecurity: Say "I Do!" to Digital Bliss
Congrats on your nuptials! We have a few tips for keeping your Big Day secure.

Why Identity Management Matters to You
Do you worry about the security of your personal data in our digital age?

Stay Secure While You Work From Home
Remote work seems like it is here to stay for many of us even as the COVID-19 pandemic recedes in our collective rearview mirror.

What We're Leaning About Data Privacy in 2023
We are living in an incredible time in history – a time when advancements in technology are creating tools that will help solve society’s greatest challenges and fuel the next wave of innovation.

How to Tell If Your Computer Has a Virus and What to Do About It
Computer viruses make your devices sick, but you can usually help them heal if you act fast.

Avoid Search Engine Ad Malware!
It's a new year and already there is a type of scam becoming extremely popular with hackers.

Online Romance and Dating Scams
Love is in the air and online, but so are cybercriminals

Public Computers and Wi-Fi
Surf safe when using public computers and networks.

What to Do if Your Password Manager Is Breached
What should you do if your password manager is breached?

What Is Data Privacy?
When you think of privacy, what comes to mind? Closing your window shades? Keeping your phone screen locked? Shutting the door when you have a sensitive conversation?

10 Online Safety Tips for Gaming
Play safe while gaming.

Dongles, Sticks, Drives, and Keys: What to Know About Removable Media
If you find a USB drive or other removable piece of media in the wild, DO NOT plug it into your computer! Let's break down why.

How to Be an Online Privacy Snob
Take control of the data you share by being picky.

Securing Your Home Network
A protected home network shuts out cybercriminals, allowing your family to use the internet more safely.

Online Shopping
Online shopping may be convenient but it can present many opportunities for scammers and cybercriminals.

Take Control of Your Data
All your online activity generates a trail of data.

Only half of teens agree they "feel supported online" by parents
Not enough children and teenagers trust their parents to support them online, and not enough parents know exactly how to give the support their children need.

What About Password Manager Risks?
In the new Password Policy ebook, What Your Password Policy Should Be, KnowBe4 recommends that all users use a password manager to create and use perfectly random passwords.

‘It’s easy to stay safe online’ with these 4 steps (plus 1)
When it comes to cybersecurity, good behavior can be rewarding.

Raising Digital Citizens
We all know the internet is a fantastic world of learning and entertainment for kids, but, like the real world, there can be dangers, too.

Best Practices for Security and Privacy Settings
Want to lead a Stay Safe Online lifestyle, but don't know where to start?

Password Managers
Don't pass on password managers. Learn more about these useful tools.

You Can Stop Cyberbullying As A Kid!
As a kid using the internet, you've probably heard of cyberbullying. Maybe you or a friend has experienced it.

The Modern Teen’s Guide to Handing Out L’s to Cyberbullies
Cyberbullying can make you feel like you can't really be "you" online. Here's what to do.

Parents and Educators: What to Do About Cyberbullying
Have you ever texted or posted something online that you would never say to someone in person? You’ve probably experienced how the internet's anonymous nature can sometimes bring out the worst in people.

10 Must-Know Tips For Keeping Your Personal Data Safe
The internet has become a vital aspect of our lives.

Secure Your Home
Internet-connected devices are helping homeowners increase efficiency, reduce costs, conserve energy and a whole host of other benefits.

Respect Privacy
Respecting the privacy of your customers, staff, and all other stakeholders is critical for inspiring trust and enhancing reputation.

Talking to Kids & Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

Online Safety Tips For Older Adults
Just as you fasten your seat belt before driving, take precautions before using the Internet to be sure you are safe and secure.

Parental Controls
As a parent, how do you stay involved in your child’s digital life?

Talking to Kids and Teens about Security and Privacy
In today’s world, digitally connected families must think about safety and security both online and offline.

COVID-19 Security Resource Library
Free resources to help individuals and organizations through the COVID-19 pandemic.

Malware, Viruses and Botnets
These 3 types of cybercriminal tools are common online, and you as an internet user might come across them from time to time.

Security Awareness Episodes
Watch and download this fun series on security best practices!

Is working on your smartphone a risky business or are you cybersecure?
The increasing use of mobile devices in our personal lives has led to a growing acceptance of smartphone usage at work.

Stalkerware
BEFORE YOU CONTINUE: Stalkerware apps can track your browsing history so if you suspect that stalkerware has been installed on your device DO NOT USE IT to research support services such as advocacy, shelter, court information or emergency services.

Tips for Higher Education Online Teaching and Learning
As online and hybrid learning environments become more popular, it is essential for students, faculty, and staff to adopt key cybersecurity practices.

K-12 Online Learning
Online learning is here to stay. Many K-12 schools will probably use some blend of fully online learning and in-person teaching for the foreseeable future.

Mobile Devices
That smartphone in your pocket, that tablet on your coffee table or that laptop on your desk contains a treasure chest of information about you, your friends and your family.

A Teacher’s Guide To Student Online Safety
Students are more connected than ever before thanks to the internet.

7 Tips for a Safer Internet of Things
The "Internet of Things" (IoT) has been a realm of technological innovation that has grown exponentially over the past decade.

Be Cyber Smart: A guide to help you do your part
Let’s brush up on cyber hygiene — basic steps we can take to stay safe in a connected world.

Reporting Matters – even for a Smishing Message
With the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your sensitive information.

7 Tips to Manage Your Identity and Protect Your Privacy Online
Worried about how much of your private information is on the internet and vulnerable to theft or misuse? You’re not alone.

Spotting a Vaccine Phishing Scam: Can You Find the Red Flags?
Many of us have seen COVID-related scams hit our inboxes. It’s no secret that scammers try to take advantage of times of panic and uncertainty, when people are most vulnerable, to steal personal information.

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
When we're online, we accumulate a significant amount of personally identifiable information (PII), which can be exploited by cybercriminals.

Security Awareness: Episode 4 – Phishing and Ransomware
We’re bringing you another free security awareness video! These videos are brought to you by Adobe, National Cyber Security Alliance, and Speechless Inc.

Owning Your Privacy by Managing Your Digital Footprint
The information you share online can reveal more details then you intend and make you vulnerable to compromise.

How to Secure and Maintain Your Digital Identity
Individuals must take proactive steps to safeguard their digital identities by being cautious about personal information sharing, connection requests, and message links.

Sextortion: What to Look Out For and What to Do If You’re a Victim
An explanation of sextortion and how it works.

The Secret Language of Emoji
Emoji appeared in 1999 with a set of 176 symbols that were meant to convey weather, traffic, technology and time. Today, there are 2,823 emoji that convey information across language, culture, lifestyle and diversity.

Stay Secure On Public Wi-Fi When Traveling
Twink twice before connecting to a public wi-fi network when you're on the go.

Protecting Baby Monitors From Hacking
The use of Wi-Fi-capable baby monitors has become indispensable to many parents.

Security and Privacy Tips for Cryptocurrency Holders
The cryptocurrency trend is definitely a big boom in today’s financial market.

Data Privacy Is Crucial for the LGBT Community
It is vitally important to consider how compromised online privacy can specifically affect marginalized groups such as the LGBT community.

Health Technology in the Digital Era – Benefits + Risks
Examining the evolution of health technologies and their implications for patient privacy and security.

Health Information Privacy – Why Should We Care?
Recent data breaches involving health information pose significant risks to our online privacy. Learn how to protect your valuable health data.

15 Online Security + Privacy Tips for College Students
You’re responsible for your own online security at college, so follow these tips to help you be safe and privacy-savvy on campus.
Resources
Initiatives
1101 Connecticut Ave, Suite 450, Washington DC 20036.
©
2025
Copyright. Stay Safe Online, NCA. All Rights Reserved.
Resources
Initiatives
1101 Connecticut Ave, Suite 450, Washington DC 20036.
©
2025
Copyright. Stay Safe Online, NCA. All Rights Reserved.
Resources
Initiatives
1101 Connecticut Ave, Suite 450, Washington DC 20036.
©
2025
Copyright. Stay Safe Online, NCA. All Rights Reserved.