Skip to main content
Back to all bundles
Bundle 12 items

Protect Your Digital Life

The average person's digital life is one breach away from a very expensive month. Reused passwords, no 2FA, backups that don't work, accounts forgotten in 2014 still running on the same email. The good news: the defences are mostly free, mostly fast to set up, and mostly the same handful of moves repeated across every account.

The kit covers personal digital defence end to end. The book lays out the framework, three guides handle the foundational moves (a 5-minute password manager setup, two-factor authentication quick-start, the 3-2-1 data backup strategy), two checklists cover securing every account and digital backup/recovery, two listicles surface the twelve habits that shield your digital life and the twenty-one digital lies hackers want you to believe, a "build your online safety shield" mini-course turns the framework into a working week, plus a stay-safe-online prompt pack and a digital defense system tool stack handle the rest. The audio companion frames the digital fortress mindset.

Aimed at the person whose 2FA is "I'll do it next weekend", and ready to make next weekend now.

Security & Privacy
Contents

In this bundle

12 items, in reading order.
  1. Audio cover for The Digital Fortress
    Audio

    The Digital Fortress

    Personal cybersecurity feels overwhelming because most advice is either expert-level technical or scaremongering, and most adults give up and hope they’re not the next breach. The honest version is structured and most of it can be installed in a weekend. The six-episode audio series treats security as an operator skill: episode one walks why most people are one click from a real breach (and what to do about it), episode two installs the password-manager basics that handle 70% of practical risk, episode three covers two-factor authentication done right, episode four breaks down what real backup strategies actually look like, episode five lands the 30-minute file-protection plan, episode six names the one habit that compounds account security across all logins. Each episode includes the moves to test in the next working day. Made for commute listening. Pair with the digital-life ebook for the long-form treatment; the audio is the briefing version.

  2. Book cover for Protect Your Digital Life
    Book

    Protect Your Digital Life

    Personal cybersecurity is in a weird place: the threats are real and growing, the advice is either expert-level technical or vendor pitches, and most people end up doing nothing because they don’t know where to start. This ebook is the long-form treatment for the average adult: the password and account-security baseline that handles 80% of risk in an afternoon, the phishing recognition that holds against the modern attacks (not the 2015 advice), the privacy-settings sweep across phones, browsers, and the major platforms most people use daily, the device-security basics that catch what’s quietly running in the background, the social-media and cloud-storage hygiene, the family-and-team protection moves that scale safety past the individual, and the recovery playbook for the moment something goes wrong. Built for the operator who knows the old "common sense" defenses aren’t enough and wants the new baseline without the security-vendor pitch.

  3. Checklist cover for Digital Data Backup and Recovery
    Checklist

    Digital Data Backup and Recovery

    Most people back up their phone to iCloud and call it done, then lose two years of work when the laptop dies and they discover the laptop wasn’t being backed up at all. This checklist installs the actual backup pass: the data inventory that names what’s worth backing up across phone, laptop, and cloud, the 3-2-1 rule applied to a personal stack (three copies, two media types, one off-site), the cloud-backup setup with the providers worth using (and the gotchas of the free tiers), the local-backup configuration that handles the laptop crash scenario, the automation check that confirms backups are actually running, and the restoration test that confirms the backups would actually restore (versus just existing). Run once per quarter. Pair with the 3-2-1 strategy guide for the architectural frame; this is the operational install pre-flight.

  4. Checklist cover for Secure Every Account You Own
    Checklist

    Secure Every Account You Own

    Most people have the same password across forty accounts and would not be able to list those accounts if asked. The first step in account security isn’t a stronger password; it’s the inventory that names what needs protecting. This checklist sequences the account-security install: the account inventory pass (email accounts, financial, social, shopping, the SaaS subscriptions billing to a card the operator forgot), the password-manager rollout that replaces the reused passwords with unique ones, the two-factor-authentication setup on the high-stakes accounts (with the right second-factor for each), the password-recovery and account-recovery option audit that catches the weak links, the dormant-account closure that reduces attack surface, and the breach-monitoring setup that catches future exposures early. Pair with the password-manager and 2FA guides for the implementation detail; this checklist is the structured pass.

  5. Guide cover for 5-Minute Password Manager Setup
    Guide

    5-Minute Password Manager Setup

    Password managers are the single highest-leverage security install most people will ever do, and most people don’t do it because the setup feels like it’ll take a weekend. The actual core install is five minutes; the migration is the longer part, and it can run in the background. This guide walks the install: the password-manager pick matched to the actual use case (1Password, Bitwarden, Dashlane, the free-tier options that suffice for individuals), the five-minute install on the first device, the master password creation that’s strong without being unmemorable, the migration plan that handles the existing reused passwords without trying to do them all in one session, the daily-use features (autofill, secure notes, sharing) that earn the subscription, and the security add-ons (breach monitoring, recovery contacts) worth turning on. Pair with the secure-every-account checklist for the broader install; this is the password-manager start.

  6. Guide cover for The 3-2-1 Data Backup Strategy
    Guide

    The 3-2-1 Data Backup Strategy

    The 3-2-1 backup rule is the most-cited and least-implemented data-safety practice on the internet, and most people read about it once and never set it up. The actual install is more straightforward than the explanations make it sound. This guide walks the practice: the principle (three copies of the data, two different media types, one copy off-site) translated into actual tools and storage tiers a normal person uses, the backup-planning pass that decides what’s worth the storage cost, the tool and storage selection (cloud picks, local picks, the combinations that work for different budgets), the actual install with the screenshots and steps for the major platforms, the extra protection layer (encryption, versioning, restoration testing) that catches the failure modes most backups quietly have, and the emergency-recovery walkthrough for the moment something goes wrong. Pair with the data-backup checklist for the audit; this guide is the architecture.

  7. Guide cover for Two-Factor Authentication Quick-Start
    Guide

    Two-Factor Authentication Quick-Start

    Two-factor authentication is the second-highest-leverage security install after a password manager, and most people skip it because the setup looks like a chore and SMS-based 2FA looks "good enough." It isn’t. This guide installs 2FA properly: the 2FA fundamentals that explain why authenticator apps and hardware keys actually beat SMS (and the specific accounts where the upgrade matters most), the account-by-account setup walkthroughs for email, banking, social, and the major SaaS accounts, the tool comparison (Authy, 1Password’s built-in TOTP, Google Authenticator, hardware keys like YubiKey), the backup-codes setup that prevents the lockout disaster, the daily-safety habits that handle the friction without abandoning the practice, and the family-and-team guidance for getting the practice past one person. Pair with the password-manager guide for the foundation; this guide is the second layer.

  8. Listicle cover for 12 Habits That Shield Your Digital Life From Hackers
    Listicle

    12 Habits That Shield Your Digital Life From Hackers

    Most online safety advice runs to a paragraph each on three obvious tips and stops there, missing the twelve daily habits that actually shift the risk math. This listicle catalogs them: the unique-password-per-account discipline that requires a password manager, the 2FA-on-every-critical-account move, the link-hover-before-click reflex, the unknown-attachment-skip rule, the privacy-settings quarterly review, the public-Wi-Fi-without-VPN avoidance, the software-update-without-delay habit, the financial-account-monitoring practice, the camera-and-mic-permission audit, the social-media-data-minimization pass, and two more. Each habit has the diagnostic and the time-to-install. Made for sequential install, not for committing to a project. Sibling to the digital-lies listicle; this one is the daily-habit layer.

  9. Listicle cover for 21 Digital Lies Hackers Want You to Believe
    Listicle

    21 Digital Lies Hackers Want You to Believe

    Personal cybersecurity is full of comfortable lies that keep people from doing the actual work, and the lies persist because they’re flattering: "I’m not important enough to target," "my password is unique because I add the year," "macOS doesn’t get viruses," "I’d notice if I was hacked." This listicle catalogs twenty-one of the most common misconceptions, names each one, then replaces it with the actual fact and the simple action that closes the gap: the antivirus-is-enough lie, the strong-password-is-enough lie, the public-Wi-Fi-is-fine lie, the I-can-spot-phishing lie, the my-data-isn’t-valuable lie, and seventeen more. Made for sharing with the family member who keeps using the same password everywhere. Sibling to the twelve-habits listicle; this listicle is the mindset audit that makes the habits make sense.

  10. Mini-Course cover for Build Your Online Safety Shield
    Mini-Course

    Build Your Online Safety Shield

    Most personal-cybersecurity courses are technical or scary, and most students bail before they install anything. This drip course runs the install across a working week, in plain language, with no fearmongering: lesson one explains where the actual threats come from in 2026 (and which threats most adults can stop worrying about), lesson two covers how attackers trick people through phishing, fake messages, and manufactured urgency, lesson three installs the password and account protections that handle most of the risk in an afternoon, lesson four sets daily and weekly safety habits, lesson five covers the monthly checkup routine, lesson six handles the evolving threats including AI-generated attacks, lesson seven covers the family-and-team protection moves. Built for the operator who knows the old common-sense defenses aren’t enough and wants the new baseline without becoming a paranoid expert.

  11. Prompt Pack cover for Stay Safe Online
    Prompt Pack

    Stay Safe Online

    Cybersecurity work for individuals eats time in the small structured jobs: setting up a new account safely, evaluating a suspicious message, configuring privacy on a new device, helping a family member do the same. The pack handles those jobs with structured prompts: password-and-account-setup prompts that walk the operator through the right configuration on a new account, phishing-evaluation prompts that read a suspicious message and produce a trust verdict with the reasoning, two-factor-setup prompts matched to the actual account being secured, backup-and-recovery prompts that produce a personalized backup plan from the actual data inventory, network-security prompts for home Wi-Fi and smart-home device hardening, and daily-safety habit prompts that reinforce the practice without nagging. Drop them into Claude or ChatGPT alongside the actual context. Pair with the safety-shield course for strategy; the prompts are the working session.

  12. Toolstack cover for Digital Defense System
    Toolstack

    Digital Defense System

    Personal cybersecurity tooling sprawls fast and most people end up paying for tools that overlap, then skipping the tools that actually matter. The kit here is the curated short-list for the average adult, organized by job: the account-security tools (1Password or Bitwarden for password management, Authy or YubiKey for 2FA, Have I Been Pwned for breach monitoring), the device-protection picks matched to platform (built-in tools first, the third-party adds that earn their cost), the backup-and-recovery stack (cloud and local, with the right combination for the budget), the daily-and-monthly-habit checklists, the privacy-and-network tools (DNS-level filtering, VPN where it’s actually needed), and the recovery-planning templates. Each pick has a one-line reason and a price tier. Pair with the safety-shield course for strategy; this list is the buy-list.