Beth Andress · Framework
A five-pillar framework for protecting yourself and your organization against digital fraud, social engineering, and AI-enabled threats.
Developed by Beth Andress — Canadian digital fraud educator and self-defence trainer
Most digital security frameworks are built for IT professionals. They focus on firewalls, encryption, and network architecture. They assume the threat is technical. But the vast majority of successful digital attacks don't exploit technology — they exploit people. They exploit trust, urgency, fear, and the natural human tendency to want to help.
The Digital Self Defence Method is a framework built for everyone else. It is designed for individuals, families, professionals, and organizations who want to understand how they're targeted and what they can do about it — without needing a technical background. The five pillars work together as a system: each one reinforces the others, and together they provide a comprehensive foundation for navigating the modern threat landscape.
You can't defend against what you don't see.
The foundation of digital self defence is understanding the landscape of threats that exist — how they work, why they're effective, and who is behind them. Most digital attacks don't exploit technology. They exploit people. Awareness means knowing that scams follow predictable patterns, that social engineering relies on specific psychological triggers, and that the threat landscape is changing rapidly as AI tools become accessible to criminals. Awareness is not paranoia. It is calibrated knowledge that changes how you respond in real situations.
Recognizing that urgency is a manipulation tactic, not a reason to act
Understanding how impersonation scams work before receiving one
Knowing which fraud types are currently active in Canada
Understanding how AI is being used to make attacks more convincing
Trust, but verify — through a channel you control.
Verification is the single most protective habit in digital self defence. The majority of successful scams — phone fraud, business email compromise, romance scams, AI voice cloning — succeed because the target acts on information provided by the attacker without independently confirming it. Verification means contacting organizations and individuals through channels you find yourself, not channels provided in the suspicious communication. It means establishing family code words before an emergency arises. It means building callback protocols into financial processes. Verification is a habit, and like all habits, it becomes automatic with practice.
Hanging up and calling back using a number from the official website
Confirming wire transfer requests through a separate phone call to a known number
Reverse image searching profile photos before trusting an online relationship
Establishing a family code word for voice cloning emergencies
Your identity is assembled from small pieces. Know what's out there.
Identity protection is the active management of your digital footprint — the information about you that exists online, whether you put it there or not. This includes your social media profiles, your professional history, your public records, your email address in data breach databases, and the answers to security questions that you've shared without realizing it. Identity theft doesn't require a sophisticated hack. It often requires only a combination of publicly available information. Identity protection means auditing your exposure, limiting what you share publicly, using strong unique passwords managed through a password manager, enabling two-factor authentication, and monitoring your credit file regularly.
Auditing what information about you is publicly visible online
Using unique passwords for every account through a password manager
Enabling two-factor authentication on email, banking, and social media
Checking your credit report annually with Equifax Canada and TransUnion Canada
Scams follow scripts. Learn the scripts.
Fraud detection is the ability to recognize the specific patterns, scripts, and structures that fraudsters use — in real time, while you're in the middle of a situation. Scams are not random. They follow predictable arcs: the initial contact, the establishment of trust or authority, the manufactured urgency, the request for action. Investment fraud, romance scams, grandparent scams, CRA impersonation, business email compromise — each has a recognizable structure. Once you know those structures, they become visible even when the details change. Fraud detection is pattern recognition, and it is a learnable skill.
Identifying the arc of a romance scam before the financial request arrives
Recognizing CRA impersonation calls by their standard script elements
Spotting business email compromise attempts in financial workflows
Detecting pig butchering investment fraud before significant losses occur
The tools that protect us are also being used against us.
AI risk awareness is the newest pillar of digital self defence, and it is the fastest-evolving. Artificial intelligence has dramatically lowered the cost and increased the scale of fraud. AI voice cloning can replicate a person's voice from seconds of audio. AI-generated text produces phishing emails indistinguishable from legitimate communications. Deepfake video is being used in business fraud and sextortion. AI-powered chatbots are conducting the early stages of romance scams at scale. Understanding what AI can and cannot do — and how it is being weaponized — is now a foundational component of personal and organizational security. The verification habits that protect against traditional fraud protect against AI-enhanced fraud too, but only if you know why they're necessary.
Understanding that a familiar voice on the phone is no longer proof of identity
Recognizing that AI-generated emails can perfectly match a colleague's writing style
Knowing that deepfake video calls are now possible with consumer technology
Understanding how to audit your public audio and video footprint
How the Framework Is Applied
The Digital Self Defence Method is the foundation of Beth Andress's training programs for organizations, workplaces, and communities across Canada. Each program is built around the five pillars, adapted to the specific threat landscape and risk profile of the audience.
Whether the audience is a real estate brokerage navigating AI governance obligations, a municipality managing public sector digital risk, or a community group protecting vulnerable members from fraud, the framework provides a consistent, learnable structure that translates into real behavioural change.
Digital Self Defence Library
Beth delivers training programs built around this framework for workplaces, communities, and public sector organizations across Canada.