How to Secure Your Digital Life — Part I