

Purpose: Help non-technical parents understand what “digital footprint” means and where real risk lives.
What they do: Identify the family’s biggest exposure areas (accounts, devices, scams, identity), pick top priorities, and define what “secure enough” means for their household.
Purpose: Lock down the #1 breach driver: weak/reused credentials and poor recovery setup.
What they do: Set up a password manager (simple, practical), fix reused passwords, improve account recovery, and learn passkeys at a parent-friendly level
Purpose: Reduce account takeovers with reliable “second layer” protection.
What they do: Turn on two-step sign-in for high-value accounts, choose safer options (app/keys over text when possible), and avoid common lockout mistakes
Purpose: Make the whole family harder to trick.
What they do: Learn the modern scam playbook (texts, calls, email, social DMs), set household “pause-and-verify” rules, and practice a simple verification workflow
Purpose: Reduce oversharing, impersonation risk, and “public breadcrumbs.”
What they do: Tighten privacy settings, remove risky profile details, reduce location exposure, and set family posting guidelines
Purpose: Create safety guardrails while preserving trust.
What they do: Establish device baselines (updates, basic protections), set age-appropriate boundaries, and implement monitoring principles that are transparent and ethical.
Purpose: Close the gap between “settings enabled” and “settings that hold up in real life.”
What they do: Understand common bypass patterns at a high level (prevention-only) and apply parent-side mitigations: settings hardening, account controls, and household rules.
Purpose: Reduce identity theft risk for parents and kids.
What they do: Check what data may already be exposed, reduce broker-style exposure (process-focused), and implement credit protection steps (including family considerations).
Purpose: Prevent avoidable exposure when away from home.
What they do: Safer device practices for hotels/airports/cafes, travel-ready settings, and family rules for public networks.
Purpose: Replace panic with a simple playbook.
What they do: Step-by-step response plan: regain control, secure recovery options, check financial/identity impacts, and prevent repeat compromise.
Purpose: Make it sustainable after Day 21.
What they do: Monthly habits, quarterly check-ins, and a calm conversation framework to keep everyone aligned without conflict.
Purpose: What do to do if
If your email/account is taken over
Lost/stolen phone quick actions
If money was sent / gift cards / Zelle-type mistake
Private Community: Get all your questions answered and be on the ground floor in tweaking and designing this course.
Lifetime Membership: Pre-Launch Members get lifetime access to this course and ANY updated material.
Additional Bonus: After Pre-Launch members will have to PAY for their membership after 12 months. You will NEVER have another membership fee for this course!
Monthly 30-Minute Group Office Hours Call (12 months) — Get live implementation help and unblock your progress (questions submitted in advance for focused, step-by-step answers).




Parents of teens (and pre-teens) who feel outmatched by technology
You want clear, step-by-step actions to reduce real risk—without turning your home into a surveillance state.
Busy parents who want a “done-by-the-end” digital safety baseline
You are time-poor and want a verified minimum standard (across accounts, devices, scams, and exposure—built in 15 minutes a day.
Families who have already had a close call
A weird login alert, a hacked social account, a scary text from a “principal,” a compromised email, or a money-scam attempt—and you want a plan that prevents the next one
This is not tech news or theory. It is a 21-day execution sprint with “Done Definitions,” templates that proves progress
We lock down the few things that prevent the most damage: email, Apple/Google, banking, and carrier access—then install a household scam protocol that stops expensive mistakes.
You’ll learn oversight boundaries, monitoring levels and privacy-by-default settings—so you reduce risk and conflict at the same time.
I focus on making sure you’re not guessing under stress: account takeover, phishing clicks, lost/stolen phone, and “money sent” scenarios—each with a clear first-60-minutes and first-72-hours checklist
Parents looking for a quick hack or a single app to “solve it all"
Anyone who wants bypass methods, loopholes, or instructions to defeat controls.
People unwilling to make basic changes across accounts and devices.