Digital Journey Background

Digital Safety & AI Journey

The 2025 master guide to online confidence, resilience, and awareness.

Start Here: What “Digital Resilience” Really Means

Being digitally resilient is about building habits that protect your money, your identity, and your peace of mind. You don’t need to be “good with tech” — you just need a few repeatable steps.

Protect accounts
Strong passwords + 2‑step verification stops most break-ins.
Protect yourself
Privacy settings + boundaries reduce harassment and stalking risks.
Protect your attention
Misinfo and outrage content are designed to hijack your emotions.
Protect your future
Backups and a digital legacy plan save stress later.
Simple rule: If something makes you feel pressured, rushed, scared, or excited to “act now” — pause and verify.
🔐

1. Mastering Online Safety (Passwords + 2FA)

What it is: A layered defence for your most important accounts.

How it works: Unique passwords stop “credential stuffing” (where hackers reuse leaked passwords), and 2FA blocks logins even if a password is stolen.

Pros: Strong protection for bank, email, and social accounts.
Cons: Needs a system (password manager or written secure record).
Most important accounts to secure first
  • Email (controls password resets for everything else)
  • Banking and payment apps
  • Apple ID / Google Account (controls device + app security)
  • Social media (often used for impersonation scams)

Safety Habit Checklist

Safety Habit Score: 0/3
Best next step: Turn on 2FA for your email first. If someone controls your email, they can reset your other accounts.
🛡️

2. Protecting Women & Girls

What it is: Proactive protection against digital stalking, image-based abuse, and gender-based harassment.

How it works: Privacy audits reduce what strangers can access; platform tools and hashing services can help prevent sharing of intimate images.

Pros: More control, confidence, and safety online.
Cons: New apps may need settings checked again.
Quick privacy audit (10 minutes)
  • Set profiles to Private where possible.
  • Review who can message/comment/tag you.
  • Turn off location sharing on posts/photos.
  • Review followers/friends list and remove unknowns.
Action: Use Strict privacy settings on social apps and visit StopNCII.org to protect personal images.
🔍

3. Mis & Disinformation

What it is: Misinformation (shared by mistake) and disinformation (made to manipulate).

How it works: Algorithms reward outrage and engagement, so emotionally charged content spreads fast.

Pros: Real-time updates and community awareness.
Cons: Echo chambers, fear-driven sharing, and scams disguised as “news”.
The SIFT method: Stop → Investigate source → Find trusted coverage → Trace to original context.
Red flags a post may be misleading
  • “Share before it’s deleted” / “the media won’t show you this”.
  • No source, no date, or cropped screenshots.
  • Strong emotional trigger: rage, fear, disgust.
  • Account is brand new or has unusual posting patterns.
💬

4. Messaging & Connected Devices

How it works: Many chat apps use end-to-end encryption. Smart devices (IoT) use your Wi‑Fi to communicate with online services.

Pros: Free global communication and smart home convenience.
Cons: “Hi Mum” scams, account takeovers, default-password attacks.
Home Wi‑Fi basics (quick safety)
  • Change router admin password (not the Wi‑Fi password only).
  • Use WPA2/WPA3 if available.
  • Keep router firmware updated (or ask provider).
  • Remove unknown devices from the network list.
Action: Never share a 6‑digit WhatsApp code with anyone. Real companies won’t ask for verification codes.
🤖

5. AI, Deepfakes & “Too Real” Scams

What it is: AI can generate realistic text, images, audio, and video — including fake “proof”.

Why it matters: Scammers can impersonate voices, create fake screenshots, or generate convincing messages.

Pros: Helpful tools for learning, accessibility, and productivity.
Cons: Impersonation, deepfakes, fake evidence, and manipulation at scale.
Deepfake / impersonation safety steps
  • Use a family code word for urgent money requests.
  • If a voice/video seems “off”, hang up and call back using a saved contact.
  • Don’t trust screenshots alone — verify via official apps/websites.
  • When in doubt: slow down, confirm with a second channel.

AI Safety Checklist

AI Safety Score: 0/2
📸

6. Your Digital Legacy

What it is: Planning what happens to your photos and accounts if you become seriously unwell or pass away.

What to include in a simple legacy plan
  • Where your photos are stored (phone, Google Photos, iCloud).
  • A trusted person who knows where to find important information.
  • Legacy contact settings (Google/Facebook/Apple where available).
  • Backups: one cloud + one physical (USB/external drive).

Legacy Checklist

Legacy Score: 0/3
📋

7. Your Digital Action Plan (Quick Reference)

Use this as a quick “what to do next” list.

Topic Key action
Passwords & 2FA Secure email first. Use unique passwords + turn on 2FA.
Women’s Safety Set social accounts to strict privacy. Use StopNCII.org if needed.
Misinformation Use SIFT. Don’t share while emotional.
Messaging Never share verification codes. Use a family code word.
Connected Devices Change router admin password + update firmware.
AI / Deepfakes Verify urgent requests via call-back on a saved number.
Digital Legacy Back up photos + set legacy contact.
🧙‍♂️

Online Safety Whiz Quiz

1) A text from a new number says “Hi Mum, I lost my phone.” What do you do?

2) You see a shocking post that makes you angry. First step?

3) Someone asks for the 6‑digit code sent to your phone. You should:

4) The safest place to enable 2FA first is usually:

🆘

Digital First Aid (UK)

If you or someone you know has been affected by online fraud or harassment, contact these services:

Action Fraud
Report scams & fraud.
0300 123 2040
StopNCII
Stop Non‑Consensual Image Sharing.
stopncii.org
Citizens Advice
Scams & consumer rights.
0808 223 1133

Ready to learn more in person?

Join a Bytees Session Today