Everything you need to protect yourself online — explained simply, with free tools to act on what you learn.
Clicked a suspicious link and panicked? Here is exactly what to do in the next 60 minutes to protect your accounts, device, and identity.
Phishing emails fooled 3.4 billion people last year. Learn the nine signs that give every phishing email away — including the ones that look completely legitimate.
Before you open that email attachment, downloaded file, or USB drive content — run these five checks. Takes 60 seconds and could prevent ransomware.
Seven quick checks to tell if a website is safe before you visit or enter your details. Takes under 2 minutes — includes free tools.
Ransomware encrypts your files and demands payment. Learn exactly how it works, how it spreads, and the 6 things you can do right now to stay safe.
Eight red flags that identify scam emails — including the convincing ones. Includes a free tool to check suspicious links inside emails.
Before you click that link — here's how to check if it's safe in seconds. Five methods, from quick visual checks to free scanning tools.
Malware is software designed to damage or steal from you. Learn the 8 types — virus, ransomware, trojan, spyware and more — and exactly how to protect your devices.
Most passwords are cracked in seconds. Here's the formula for creating passwords that would take centuries to break — and how to remember them.
Two-factor authentication stops 99.9% of automated account attacks. Here's how it works, which type is safest, and how to enable it on every major platform.
Signs your email account has been compromised — and the exact steps to take right now to secure it, change access, and stop the damage spreading.
Your data was breached. Here's exactly what to do in the next 48 hours to protect your accounts, money, and identity before damage spreads.
Fake websites look real. Here are 9 warning signs that expose them — plus free tools to check any website before you enter a password or card number.
Social engineering manipulates people, not systems. Learn the 6 most common attack types — pretexting, baiting, tailgating — and how to defend against each.
Identity theft affects millions every year. These 10 habits take under an hour to set up and dramatically reduce your risk of becoming a victim.
Knowledge is half the battle. Use our free tools to act on what you read.
See All Free Tools