Tutorial

Cybersecurity

Protecting yourself, your family, and your data in the digital world. Covers passwords, authentication, phishing, malware, privacy, and incident response.

Tutorial·Difficulty: Beginner·10 chapters·Updated Apr 19, 2026

Chapters

About this tutorial

Protecting yourself, your family, and your data in the digital world.

Why Cybersecurity Matters

  • Protect your identity and finances
  • Keep your family safe online
  • Secure your personal information
  • Avoid scams and fraud
  • Maintain privacy
  • Recover from incidents when they happen

Contents

ChapterTopic
01-threat-landscapeCommon attacks and attackers
02-passwordsStrong passwords and management
03-authentication2FA, MFA, and account security
04-phishingRecognizing and avoiding scams
05-malwareViruses, ransomware, and protection
06-network-securitySecuring home networks
07-mobile-securitySmartphone and tablet protection
08-privacyProtecting personal information
09-family-safetyKeeping children safe online
10-incident-responseWhat to do when things go wrong

Immediate Actions

Top 5 Things to Do Now

  1. Enable 2FA on all important accounts

    • Email, banking, social media
    • Use authenticator app, not SMS when possible
  2. Use a password manager

    • Unique password for every account
    • Let the manager generate strong passwords
  3. Update everything

    • Operating systems
    • Applications
    • Router firmware
  4. Back up your data

    • 3-2-1 rule: 3 copies, 2 different media, 1 offsite
  5. Freeze your credit

    • All three bureaus (Equifax, Experian, TransUnion)
    • Free and effective against identity theft

Password Security

Strong Passwords

WeakStrong
password123K7$mP2@nQ9!xR4
YourDog2020correcthorsebatterystaple
123456789Randomly generated 16+ characters

Password Rules

RuleWhy
Unique for every accountOne breach doesn't compromise all
At least 16 charactersLength beats complexity
Use password managerYou can't remember good passwords
Never reuse passwordsCredential stuffing is common
Change after breachCheck haveibeenpwned.com

Password Managers

ManagerNotes
1PasswordExcellent, paid
BitwardenGreat, free option
DashlaneGood, paid
KeePassXCFree, local storage

One master password to remember - make it strong and memorable.

Two-Factor Authentication (2FA)

Types (Best to Worst)

TypeSecurityConvenience
Hardware key (YubiKey)BestModerate
Authenticator appVery goodGood
SMS/TextBetter than nothingVery easy
EmailWeakEasy

Authenticator Apps

  • Google Authenticator
  • Microsoft Authenticator
  • Authy (cloud backup)
  • 1Password (integrated)

Enable on: Email, banking, cloud storage, social media, any important account.

Phishing

How to Spot Phishing

Red FlagExample
Urgency"Account will be closed in 24 hours!"
Generic greeting"Dear Customer" instead of your name
Suspicious senderamazon-support@gmail.com
Mismatched linksHover shows different URL
Grammar/spelling errorsPoorly written message
Unexpected attachment"Invoice.pdf.exe"

When in Doubt

  1. Don't click links in emails
  2. Go directly to the website by typing the URL
  3. Call the company using a known number (not one in the email)
  4. Report suspicious emails

Common Scams

ScamHow It Works
Package deliveryFake tracking link
IRS/TaxThreatening message about taxes
Tech support"Your computer is infected"
RomanceFake relationship for money
Crypto investment"Guaranteed returns"

Home Network Security

Router Security

ActionWhy
Change default passwordFactory passwords are known
Update firmwareFix security holes
Use WPA3 (or WPA2)Never WEP, never open
Disable WPSEasy to hack
Enable firewallBlock unwanted access
Consider guest networkIsolate IoT devices

Network Hygiene

  • Inventory connected devices
  • Remove/disable unused devices
  • Segment IoT on separate network
  • Use VPN for sensitive work
  • Monitor for unusual activity

Device Security

All Devices

ActionFrequency
Install updatesImmediately
Run antivirusAlways on
Enable encryptionAlways
Lock screenAlways
Backup dataRegular

Computers

  • Full disk encryption (BitLocker, FileVault)
  • Standard user account (not admin) for daily use
  • Don't install unknown software
  • Be careful with browser extensions

Mobile

  • Enable biometric + PIN
  • Only official app stores
  • Review app permissions
  • Enable remote wipe
  • Don't jailbreak/root

Privacy

Reducing Your Footprint

ActionBenefit
Use privacy-focused browserLess tracking
Use VPNHide IP address
Limit social media sharingLess personal info exposed
Review privacy settingsControl what's shared
Delete old accountsReduce attack surface

Data Minimization

  • Don't give info you don't need to give
  • Use fake birthday/info for unimportant accounts
  • Use email aliases for signups
  • Opt out of data brokers

Family Safety

Children Online

AgeFocus
Young childrenSupervised use, kid-safe content
TweensPrivacy settings, safe sharing
TeensDigital footprint, predator awareness

Conversations to Have

  • What information should never be shared
  • How to recognize predatory behavior
  • What to do if something makes them uncomfortable
  • Screenshots and digital footprint permanence
  • Cyberbullying response

Technical Controls

  • Content filtering (OpenDNS, router-level)
  • Screen time limits
  • App approval
  • Location sharing (for safety)
  • Regular check-ins on usage

When Things Go Wrong

Signs of Compromise

SignPossible Meaning
Unexpected password changesAccount hijacked
Strange account activityUnauthorized access
Unfamiliar devices logged inSomeone else has access
Ransomware messageMalware infection
Slow/strange device behaviorPossible infection

Incident Response Steps

  1. Contain - Disconnect affected device
  2. Assess - What's affected?
  3. Remediate - Change passwords, run scans
  4. Recover - Restore from backup if needed
  5. Learn - How did it happen? Prevent repeat

Who to Contact

SituationContact
Identity theftidentitytheft.gov, credit bureaus
Financial fraudBank, FTC, local police
FBI for serious cybercrimeic3.gov
Data breachState attorney general

Security Checklist

Monthly

  • [ ] Check bank/credit statements
  • [ ] Review account activity
  • [ ] Update devices

Quarterly

  • [ ] Review account access
  • [ ] Check for breaches (haveibeenpwned.com)
  • [ ] Review security questions/recovery options

Annually

  • [ ] Review credit reports
  • [ ] Audit old accounts (close unused)
  • [ ] Review password manager
  • [ ] Update emergency contacts
  • [ ] Test backups

Resources

Tools

ToolPurpose
haveibeenpwned.comCheck if email was in breach
Privacy BadgerBrowser tracking blocker
uBlock OriginAd/malware blocker
MalwarebytesMalware scanner

Information

  • CISA.gov (official US cyber advice)
  • Krebs on Security (blog)
  • National Cyber Security Centre (UK)
  • EFF (Electronic Frontier Foundation)

Key Takeaways

  1. Basics matter most - Strong passwords + 2FA stop most attacks
  2. Updates aren't optional - They fix security holes
  3. Think before clicking - Phishing is the #1 attack vector
  4. Backup, backup, backup - Ransomware can happen to anyone
  5. You're a target - Everyone has something worth stealing
  6. It's never "too late" - Start improving security today
  7. Security is ongoing - Not set-and-forget