Privacy & Cyber Security Techniques

Complete Privacy

After considerable requests from our clients, we have made our privacy and cyber-security recommendations available free for everyone!

A brief privacy checklist is available below, if you would like training of our comprehensive privacy services, contact us 24/7.

If you believe your phone may have been accessed by anyone with malicious intent, at the very least conduct a full factory reset prior to continuing. Some malware has the ability to persist even after a factory reset is done. In those instances, purchase a new device from a reputable source.

Set up a PIN/Password/Biometrics – make sure your phone can only be accessed by you.

Install a VPN Service – we recommend purchasing a ProtonVPN account for its true zero-knowledge framework. ProtonVPN is available for all platforms.

VoIP Numbers – purchase and use a Voice over IP (VoIP) phone number to ensure your privacy can not be compromised by a weak link within the phone service provider.  

Stay up-to-date – always update your apps and phone software to the latest version to protect yourself from the latest exploits.

Mobile Phishing Links – never click on or open any links sent to you by text message or email. These texts are becoming more sophisticated to trick people to open them. Common methods include sending links through a URL shortener services such as bit.ly or websites disguised to look legitimate. Other links may include IP addresses (eg. 172.40.298.29)

Malware on computers is far more prominent than on any other personal device. Cybercriminals know that devices exist that can compromise a physically accessible computer (complete & hidden backdoor access) in as little as 3 seconds.

It is a common myth that Apple devices are immune from viruses and compromise, though they do appear to have less incidents overall.

Install a VPN Service – we recommend purchasing a ProtonVPN account for its true zero-knowledge framework. ProtonVPN is available for all platforms.

Mozilla Firefox – we recommend this browser for its enhanced privacy business model and default settings.

Stay up-to-date – always update your computer software to the latest version to protect yourself from the latest exploits. Conduct antivirus scans often.

Military Grade Encryption | Live Operating Systems | Advanced Firewalls – Part of our advanced privacy and security consultation services.

Contact us for more details.

Consider any device provided by an employer as monitored and never access any personal accounts on these devices.

Be mindful of the camera and microphone on work phones and computers when conducting sensitive or personal business.

Password Managers – Most people reuse passwords which have been in data breaches and are available on dark markets for cheap/free. Be in the top 1% of safe internet users by using a password manager. Remember only one unique password to access an encrypted database of all your other passwords.

We recommend using KeePassXC as a secure offline password manager, although other great options also exist.

Check your phone number and email for breaches at HaveIBeenPwned.com  (never check any passwords you currently use)

Encrypted Email – We recommend using a paid ProtonMail account as a primary end-to-end encrypted and zero-knowledge email provider for anything important.

2-Factor Authentication (2FA) – Ensure all of your accounts are secured with two factor authentication. Never share 2FA codes with anyone.

For best security practices, don’t use your phone number for 2FA as it is vulnerable to sim swap attacks.

An application authenticator such as Google or Microsoft Authenticator, LastPass Authenticator, Twilo’s Authy, or a Youbikey device offer greater security.

Additional information and training is available through our
advanced privacy and security consultation services

5/5

Let's Get started

USE OUR PRIVATE & CONFIDENTIAL FORM TO SUBMIT YOUR CASE DETAILS

Scroll to Top