Authentication - Most reported data breaches are caused by the use of weak, default or stolen passwords (checklist)Web Browsing - Most websites on the internet will use some form of tracking, often to gain insight into their users behaviour and preferences. This data can be incredibly detailed, and so is extremely valuable to corporations, governments and intellectual property thieves. Data breaches and leaks are common, and deanonymizing users web activity is often a trivial task (checklist)Mobile Devices - Geo-tracking is used to trace our every move, and we have little control over who has this data- your phone is even able to track your location without GPS (checklist)Email - It's important to protect your email account, as if a hacker gains access to it they will be able to pose as you, and reset the passwords for your other online accounts. One of the biggest threats to digital security is still phishing, and it can sometimes be incredibly convincing, so remain vigilant, and understand how to spot malicious emails, and avoid publicly sharing your email address (checklist)Secure Messaging - Your conversation can only be as secure as the weakest link. Often the easiest way to infiltrate a communications channel, is to target the individual or node with the least protection (checklist)Networking - How to connect your devices to the internet securely, including configuring your router and setting up a VPN (checklist)