You’ll find simple, helpful advice on this page that you can use straight away. If anything is unclear, please ask.
(last updated: 16/06/2025)
🧾 What is it?
2-step login (also called two-factor authentication, or 2FA) adds a second layer of security to your online accounts.
Instead of just using a password, you'll be asked for something else — like a code sent to your phone, an app-generated code, or a fingerprint. This means that even if someone knows your password, they still can't get in without the second step.
🚨 Why it matters
Passwords can be guessed, stolen, or leaked in data breaches. It happens more than you think. 2-step login makes that password alone useless to a scammer.
That’s why most major services now offer it — and why we strongly recommend turning it on.
🧠 Common real-world examples
📱 Types of 2FA (ordered best to worst)
Always enable 2FA on your email account first as it’s often used to recover other accounts.
Click here to head back to the top of our learn page.
Most big services support 2FA.
Here are direct guides:
You’ll usually find it under:
📩 Need help?
Send us a message and we’ll walk you through it step by step.
📄 What is it?
Antivirus software helps protect your device from harmful software (known as malware) that can steal your data, damage files, or give someone remote access to your computer.
It checks files, websites, and downloads in the background — and alerts you if something seems dangerous.
🛡️ Why it matters
Even if you’re careful, mistakes happen. A single click on a bad link or download can install malware without you realising.
Antivirus gives you a second chance — catching threats before they cause harm.
Most antivirus tools also block phishing websites, scam pop-ups, and fake downloads.
💻 Common real-world examples
✅ Best practices
Click here to head back to the top of our learn page.
All devices should have anti-virus, including phones and computers.
Here are antivirus tools we trust. They’re safe, effective, and won’t pressure you into paying.
Recommended computer AV:
Recommended phone AV:
📩 Need help?
Send us a message and we’ll support you in any way we can.
📄 What is it?
A strong password is one that’s hard for someone else to guess — even if they know things about you.
It’s longer, more unique, and not based on names, birthdays, or simple words.
The best passwords often look strange, or are made of several unrelated words.
🛡️ Why it matters
Weak passwords are easy to crack. If someone can guess your password or it’s leaked in a data breach, they could get into your email, bank, or social media accounts.
🧠 Common real-world examples
🔐 Tips for strong passwords
A strong password doesn’t have to be hard to remember! A password like “Yellowcandle-Horse-Bus1?” is better than “Summer2023!”
Click here to head back to the top of our learn page.
Passwords don’t have to be a headache.
Using a password manager means you only need to remember one strong password. It handles the rest safely.
Our recommended tools:
Not ready for one yet?
Browsers like Chrome, Safari, and Edge have built-in password saving. That is still far better than reusing passwords or writing them down.
👉 Just make sure your browser account (like Google or Apple ID) uses a strong password and 2-step login.
📩 Need help?
Send us a message and we’ll walk you through it.
📄 What is it?
Reusing the same password across multiple websites might feel convenient, but it’s one of the easiest ways to get hacked.
If one website is breached and your password is exposed, attackers often try it on other sites to see what else they can access.
🔓 Why it matters
Many attacks today don’t come from guessing your password, they come from using already leaked ones.
This is called a credential stuffing attack and it works when people use the same password everywhere.
Once someone has access to your email, they can take control of your other accounts, often without you noticing.
⚠️ Real-world example
✅ What to do instead
Click here to head back to the top of our learn page.
You can check your email or login against known data breaches using this trusted tool:
(just enter your email)
If any accounts show up, change those passwords immediately, and make sure they’re no longer used anywhere else.
📩 Need help?
Send us a message and we’ll walk you through it.
📎 What it is
Links, attachments, or pop-ups can look harmless but one careless click can lead to malware, scams, or stolen information.
❗ Why it matters
Most scams rely on you clicking before you’ve had time to think.
Even something as simple as a fake delivery text or “your account is locked” email can trick people into handing over passwords or downloading malware.
🧾 Real-world examples
✅ What to do
Click here to head back to the top of our learn page.
Scammers often copy real company logos, colours, and sender names.
But they can’t fake:
If you are unsure, never interact.
📩 Need help?
Send us a message and we’ll walk you through it.
🛠 What it is
Device updates fix bugs and close security gaps. These updates come from the makers of your phone, computer, apps, or antivirus tools.
❗ Why it matters
Cybercriminals often look for devices that haven’t been updated — because they’re easier to break into.
Even small updates can fix serious flaws that hackers could use to steal your data or install spyware.
💡 Real-world examples
✅ What to do
Click here to head back to the top of our learn page.
📎 What it is
Scammers and hackers can use personal details you share online, even small ones, to trick or impersonate you.
This includes things like your birthday, job, location, or family info.
🚩 Why it matters
The more someone knows about you, the easier it is to:
Even an innocent photo or comment can give away useful info.
💡 Real-world examples
✅ What to do
Click here to head back to the top of our learn page.
Public posts can give scammers what they need.
Be careful sharing:
📩 Need help?
Send us a message to talk about this topic.
📎 What it is
Locking your device means adding a PIN, password, fingerprint, or face recognition to stop anyone accessing it without your permission.
It applies to your phone, laptop, tablet, or anything else that holds personal info.
🚨 Why it matters
If someone gets hold of your device and it’s not locked, they could:
Even a short time with an unlocked device can do real damage.
💡 Real-world examples
✅ What to do
Click here to head back to the top of our learn page.
A few simple habits can help greatly:
📩 Need help?
Send us a message to talk about this topic.