Start Here: What “Digital Resilience” Really Means
Being digitally resilient is about building habits that protect your money, your identity, and your peace of mind. You don’t need to be “good with tech” — you just need a few repeatable steps.
Strong passwords + 2‑step verification stops most break-ins.
Privacy settings + boundaries reduce harassment and stalking risks.
Misinfo and outrage content are designed to hijack your emotions.
Backups and a digital legacy plan save stress later.
1. Mastering Online Safety (Passwords + 2FA)
What it is: A layered defence for your most important accounts.
How it works: Unique passwords stop “credential stuffing” (where hackers reuse leaked passwords), and 2FA blocks logins even if a password is stolen.
Most important accounts to secure first
- Email (controls password resets for everything else)
- Banking and payment apps
- Apple ID / Google Account (controls device + app security)
- Social media (often used for impersonation scams)
Safety Habit Checklist
2. Protecting Women & Girls
What it is: Proactive protection against digital stalking, image-based abuse, and gender-based harassment.
How it works: Privacy audits reduce what strangers can access; platform tools and hashing services can help prevent sharing of intimate images.
Quick privacy audit (10 minutes)
- Set profiles to Private where possible.
- Review who can message/comment/tag you.
- Turn off location sharing on posts/photos.
- Review followers/friends list and remove unknowns.
3. Mis & Disinformation
What it is: Misinformation (shared by mistake) and disinformation (made to manipulate).
How it works: Algorithms reward outrage and engagement, so emotionally charged content spreads fast.
Red flags a post may be misleading
- “Share before it’s deleted” / “the media won’t show you this”.
- No source, no date, or cropped screenshots.
- Strong emotional trigger: rage, fear, disgust.
- Account is brand new or has unusual posting patterns.
4. Messaging & Connected Devices
How it works: Many chat apps use end-to-end encryption. Smart devices (IoT) use your Wi‑Fi to communicate with online services.
Home Wi‑Fi basics (quick safety)
- Change router admin password (not the Wi‑Fi password only).
- Use WPA2/WPA3 if available.
- Keep router firmware updated (or ask provider).
- Remove unknown devices from the network list.
5. AI, Deepfakes & “Too Real” Scams
What it is: AI can generate realistic text, images, audio, and video — including fake “proof”.
Why it matters: Scammers can impersonate voices, create fake screenshots, or generate convincing messages.
Deepfake / impersonation safety steps
- Use a family code word for urgent money requests.
- If a voice/video seems “off”, hang up and call back using a saved contact.
- Don’t trust screenshots alone — verify via official apps/websites.
- When in doubt: slow down, confirm with a second channel.
AI Safety Checklist
6. Your Digital Legacy
What it is: Planning what happens to your photos and accounts if you become seriously unwell or pass away.
What to include in a simple legacy plan
- Where your photos are stored (phone, Google Photos, iCloud).
- A trusted person who knows where to find important information.
- Legacy contact settings (Google/Facebook/Apple where available).
- Backups: one cloud + one physical (USB/external drive).
Legacy Checklist
7. Your Digital Action Plan (Quick Reference)
Use this as a quick “what to do next” list.
| Topic | Key action |
|---|---|
| Passwords & 2FA | Secure email first. Use unique passwords + turn on 2FA. |
| Women’s Safety | Set social accounts to strict privacy. Use StopNCII.org if needed. |
| Misinformation | Use SIFT. Don’t share while emotional. |
| Messaging | Never share verification codes. Use a family code word. |
| Connected Devices | Change router admin password + update firmware. |
| AI / Deepfakes | Verify urgent requests via call-back on a saved number. |
| Digital Legacy | Back up photos + set legacy contact. |
Online Safety Whiz Quiz
1) A text from a new number says “Hi Mum, I lost my phone.” What do you do?
2) You see a shocking post that makes you angry. First step?
3) Someone asks for the 6‑digit code sent to your phone. You should:
4) The safest place to enable 2FA first is usually:
Digital First Aid (UK)
If you or someone you know has been affected by online fraud or harassment, contact these services:
Ready to learn more in person?
Join a Bytees Session Today