Simple privacy. Personal help. One on one setup to secure your identity, devices, and accounts.
Get StartedThis is for you if…
You're a person with higher than usual risk (e.g. local elected official, influencer, attorney, small business owner).
You don't want to spend dozens of hours of research figuring out what works and what doesn't.
You're ready to make these changes now – we'll move fast with a plan.
You're willing to accept some changes need to be made in your routine for this to work.
You want a custom privacy and security plan made specifically for you.
This is NOT for you if…
You need incident response or damage control after a breach; this is meant to prevent a fire, not put it out.
You have a dedicated IT/security department where there is a plan in place for you already.
You think cybersecurity is just using an antivirus or you have a "laissez-faire" view of it.
You're not willing to invest some effort in working with me to help you secure yourself.
You're a casual home user – the services I offer are more than you need.
Email Exchange
We'll swap some emails to see what specifically you're looking for and to see if we'd be a good fit to work together.
Strategy
Once we determine your situation, we'll create a custom blueprint to cover your privacy and security needs.
Zoom Workshop
When the strategy is finished and you're ready to get started, we'll meet on Zoom and start putting the pieces in place. This step is in-depth and hands on with close guidance.
Additional Guidance
You're likely to have a question here and there over the following several weeks after setup, which you'll have direct help with getting clarified.
Who’s this for?
This service is for people with a high risk profession such as attorneys, influencers, or local elected officials, who are frequently targeted by bad actors.
If you're a casual home user, resources from YouTube and similar sites will cover you well.
Note: This service is not intended to provide anonymity; the main focus is on cybersecurity and privacy.
How custom is “custom”?
The blueprint gets tailored specifically to you to boost security and privacy according to your current needs.
Why the email exchange first?
This lets us know if we would be a good match to work together by figuring out which risks you're currently dealing with and what changes you're willing to make. Each person has different circumstances and the initial exchange shows if my services can provide what you need.
During the exchange and consulting engagement, the process needs to be done directly with you - not with an assistant or colleague. There is a lot of detail to this type of work and the nuances would be lost if it were done through another person.
It's also important to note that contacting me doesn't guarantee I will offer my services. My work focuses on a niche of cybersecurity and any work falling outside of that will need to be done by other consultants.
What happens when we meet on Zoom?
This is where everything comes together. This involves hardening your devices (computer, tablets, phones, etc) and explaining why these changes are made. We'll also cover other details, such as recommended/critical changes to your daily routine.
Note: The meeting could also happen through Signal. This will be arranged ahead of time through email, according to your current privacy needs.
What changes do I need to make to my routine?
This will depend on how much you're willing to shift habits and ditch things causing you security/privacy issues. There's a tradeoff in convenience for an increase in protection.
How much detail do I have to give about my situation to get help?
If you're looking for security related services, the details are minimal. If you want help with privacy, then it becomes much more detailed. In order for me to effectively provide service, these details are necessary. If you were to start the email exchange and decided you didn't want to provide this information, it's not an issue, but we won't be able to proceed.
During the initial email exchange, I will also ask about any potential offline security or privacy issues you're dealing with. These are important to factor in, even though the focus is on the digital aspect.
It's also important to note that I will not work with anyone who wants to remain anonymous. I do not provide services to anyone who I cannot verify the identity of.
Are you able to assist with credible threats being made against me?
This is not currently part of the service I provide. If you are dealing with credible threats, file a report with your local law enforcement agency and contact Michael Bazzell over at IntelTechniques.com. He has a high volume of work and is placing new clients on a waitlist, though you can still contact him and let him know your circumstances.