Risk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a "friendly" attack with the idea of find issues before cybercriminals do. Together they are a strong set of practices to help you defences.
Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.
Should you track your children's every move? Your partners? Family locator apps promise safety and convenience but are they really just an invasion of privacy?
Authentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.
Hackers and cybercriminals are all "malicious actors". While you may not know who is attacking a system, having a better understanding of common motivations is important.
Malicious software (malware) is an umbrella term that covers a number of different types of software designed to do bad things...but those specific categories don't mean to much day-to-day when it comes to defence...
VPNs can help secure your internet traffic when you're travelling. They can help you route around geographic restrictions. But is using a VPN exposing you to more risk? What is the impact of centralizing all of your internet requests with one specific company?