Skip to the content.

Learning Basic Cybersecurity Practices

Loading expected effects…

What it is

A structured effort to adopt the core layer of personal digital security that sits above password management: enabling two-factor authentication (2FA) on important accounts, learning to recognise and avoid phishing attempts, keeping devices and software updated promptly, and preferring encrypted connections (HTTPS, avoiding unprotected public Wi-Fi). Together these four practices address the most common vectors through which personal accounts and devices are compromised – credential takeover, social engineering, unpatched vulnerabilities, and network interception. The intervention is distinct from password manager setup, which is a prerequisite: that intervention eliminates credential reuse; this one hardens the surrounding security layer against attacks that a strong password alone cannot stop.

Sources and key statistics
  • Covers four practices in a single behaviour-change intervention: 2FA enrolment across important accounts, phishing recognition skills, systematic software patching, and encrypted-connection habits – each targets a distinct attack vector, providing defence in depth
  • Research from KnowBe4 across millions of users shows security awareness training reduces phishing click rates by up to 86% within a year; baseline susceptibility across untrained populations is around 33%
  • Statistics from electroiq.com indicate 2FA blocks 100% of automated bot-based credential attacks and stopped an estimated 42% of cyberattacks in 2024; adoption among individuals remains low (~52% have it on at least one account)
  • Automox research attributes approximately 60% of data breaches to known, unpatched vulnerabilities – keeping software current is one of the most structurally reliable risk reductions available
  • Distinct from password manager setup: that intervention eliminates credential reuse; this one addresses what happens after credentials are set – account takeover via stolen second-factor bypass, social engineering, and device-level exploitation

Cost

Personalise these costs

Override the population estimates with your own. Saved to your profile and used to recalculate Time and Money EROIs.

per
per

How to do it

What success looks like

Common pitfalls

Prerequisites

Expected effects across life areas

Life area Value PBS ISR UAR Confidence Baseline (population percentile) EBS
Digital Safety Comprehensive security 7 70% 50% medium 35th
Digital Safety Usability and convenience -3 80% 50% medium 35th
Cognitive Skills Lifestyle integration 4 55% 50% low 35th

Detailed Scoring

Scoring uses a logarithmic scale from 0 to 10, where each unit increase represents roughly double the impact. Learn more about ROI calculations.

Digital Safety – Comprehensive security

Anchor: Change in breadth and sophistication of digital security practices

Logarithmic Scale:

  • Score 10: Transformative gain in comprehensive digital security
  • Score 8: Major gain in comprehensive digital security
  • Score 6: Meaningful gain in comprehensive digital security
  • Score 4: Modest gain in comprehensive digital security
  • Score 2: Slight, barely noticeable gain in comprehensive digital security
  • Score -2: Slight, barely noticeable reduction in comprehensive digital security
  • Score -4: Modest reduction in comprehensive digital security
  • Score -6: Meaningful reduction in comprehensive digital security
  • Score -8: Major reduction in comprehensive digital security
  • Score -10: Severe damage to comprehensive digital security
Potential Benefit Score (PBS): 7 i
Intervention Success Rate (ISR): 70% i
User Adherence Rate (UAR): 50% i
Expected Benefit Score (EBS): Loading...

Digital Safety – Usability and convenience

Anchor: Change in how seamlessly security measures integrate into daily workflows

Logarithmic Scale:

  • Score 10: Transformative gain in convenience of digital security practices
  • Score 8: Major gain in convenience of digital security practices
  • Score 6: Meaningful gain in convenience of digital security practices
  • Score 4: Modest gain in convenience of digital security practices
  • Score 2: Slight, barely noticeable gain in convenience of digital security practices
  • Score -2: Slight, barely noticeable reduction in convenience of digital security practices
  • Score -4: Modest reduction in convenience of digital security practices
  • Score -6: Meaningful reduction in convenience of digital security practices
  • Score -8: Major reduction in convenience of digital security practices
  • Score -10: Severe damage to convenience of digital security practices
Potential Benefit Score (PBS): -3 i
Intervention Success Rate (ISR): 80% i
User Adherence Rate (UAR): 50% i
Expected Benefit Score (EBS): Loading...

Cognitive Skills – Lifestyle integration

Anchor: Number of evidence-based lifestyle practices maintained daily for cognitive benefit (sleep, exercise, nutrition, stress management, social engagement)

Logarithmic Scale:

  • Score 10: 5 practices maintained daily with optimised protocols
  • Score 8: 3 practices maintained daily with understanding of cognitive effects
  • Score 6: 1-2 practices maintained specifically for cognitive benefit
  • Score 4: Basic sleep hygiene with some awareness of lifestyle effects
  • Score 2: No deliberate lifestyle practices for cognitive support
  • Score -2: Trivial abandonment of cognitive-support practices
  • Score -4: ~1 cognitive-support practice abandoned
  • Score -6: ~2 cognitive-support practices abandoned
  • Score -8: ~3-4 cognitive-support practices abandoned
  • Score -10: All 5 cognitive-support practices abandoned
Potential Benefit Score (PBS): 4 i
Intervention Success Rate (ISR): 55% i
User Adherence Rate (UAR): 50% i
Expected Benefit Score (EBS): Loading...

Evaluated on 2026-04-25 by claude-opus-4-7 using the current scoring prompt.