Basic life skills #5 — Digital literacy

Password hygiene, scam recognition, data backups, and the digital skills that separate people who own their tech from people who get owned by it.

A quick bit of history

“Computer literacy” used to mean knowing how to turn one on. Then it meant email. Then the web. By 2010 the conversation shifted to “digital literacy” — the ability to evaluate sources, recognize manipulation, protect your data, and keep your own devices working. The EU, UNESCO, and most national curricula now treat it as a core life skill alongside reading and math. Because in practice, it is one.

The machines are useful when you’re in charge of them and dangerous when they’re in charge of you. This is the chapter where you take charge.

Why this one is urgent

Every financial account, medical record, photo of your kids, and private conversation now lives on systems you don’t control. Basic literacy here is the difference between living in the modern world and being quietly exploited by it.

The skills to actually learn

SkillWhy it mattersOne concrete move this week
Password managerReusing passwords is the #1 cause of account takeovers.Install Bitwarden or 1Password. Start with your email and bank.
Two-factor authenticationStops ~99% of account compromise attempts.Turn it on for email first. That’s the master key.
Scam recognitionPhishing and romance scams target smart people, not dumb ones.Never click a link in an unexpected message. Go to the site directly.
Backups (3-2-1 rule)Hard drives fail. Phones get stolen. Clouds lock accounts.Set up one automatic backup of photos and documents. Today.
Source evaluation”I saw it online” is not a sentence adults should finish.Before sharing anything, check a second source.
Privacy settingsDefaults are designed for the company, not you.Audit your social media privacy settings once a year.
AI fluencyAI is a tool. Like any tool, know what it’s for and what it isn’t.Use a good LLM for one real task this week. Verify the output.

Evidence, briefly

The FBI’s IC3 reports consistently show that the vast majority of successful cyberattacks on individuals exploit either weak/reused passwords or basic social engineering. Two-factor authentication blocks the overwhelming majority of automated account takeover attempts. People with regular backups recover from ransomware and hardware failure in hours. People without them often lose years of data permanently.

What “mastered” looks like here

You use a password manager. You have 2FA on the accounts that matter. You recognize a phishing email on sight. You have a backup of your important data that survives losing your phone and your laptop and your cloud account. You can use AI as a tool without believing every word it says. That’s the bar.


If you’ve already mastered these, go to the next step. Next up: the physical world you live in — and how to keep it from falling apart.

Next → Home and car maintenance