Skip to main content

Tampere, Finland

Signal: @turva.19

 
Identify the package that best suits your individual needs.
 

Best for you if you want to quickly identify the most important risks and get clear next steps.


  • What it includes
  • Current-state assessment
  • Key risks and priorities
  • Clear recommended actions


  • What it does not include
  • No remote access
  • No password sharing
  • No unnecessary technical jargon


1) Basic Security (individual)

Goal: get accounts and devices into basic shape quickly.

  • Contents:
  • Passwords + password manager setup
  • 2FA for the most important accounts (email, social media, bank)
  • Updates and basic protection (Windows/macOS/iOS/Android)
  • Browser and privacy settings (basic)
  • "Basic locks in order” checklist + recommendations for the future

2) Scam Protection (individual / to support loved ones / whole family)

Goal: reduce the risk of scams in daily life.

  • Contents:
  • Signs of a scam and a practical action model (10–15 “rules”)
  • Secure email and browser settings
  • Data breach check + actions (if breaches are found)
  • Secure payment and login practices
  • One-page “how to act” guide

3) Family Package (parents + children's devices)

Goal: make children's devices and daily social media practices safer.

  • Contents:
  • Parental controls / screen time / app limits (iOS/Android)
  • Privacy settings (TikTok/IG/Snap basics)
  • Location and sharing settings 
  • Family’s shared “rule list”
  • Family-specific settings list + age-appropriate recommendations

4) Small Business Basic Security

Goal: a clear minimum standard for the company's accounts and devices.

  • Contents:
  • Company email and account security (2FA, recovery, roles)
  • Basic device policy (updates, encryption, locks)
  • Tidying up file sharing and permissions
  •  Basic backup model
  • "Company Basic Policy" document + action list

5) Assessment (a quick start for everyone)

Goal: you get a clear picture of the current situation and the next steps.

  • Contents:
  • 30–60 min assessment + prioritization of risks
  • 3 most important fixes + recommended package


6) High-Threat Model Protection

For who: CEOs, journalists, and public figures. A quick start and a clear plan.

Goal: minimize account takeovers, targeted scams, doxxing, data leak risks, and loss of privacy – practically and quickly.

Delivery Model: Start via a “secure channel” (Signal/SimpleX/Proton), no sensitive information via email.


1) Threat modeling and risk assessment (60–90 min)

  • Who could be the attacker (opportunist / targeted / insider / stalking)
  • What is most critical (email, social media, cloud services, bank, PR/reputation crisis, family)
  • Prioritized “fix these 5* first” list

2) Account security to a “cannot be hijacked” level (90–180 min)

  • Password manager + strong unique passwords
  • “FIDO2/passkey / security keys” (recommendation), get 2FA set up everywhere
  • Recovery channels: backup email, phone numbers, recovery codes, “break-glass” plan
  • Email hardening (because it's usually the key to everything)

3) Device hardening (1–3 devices, 90–180 min)

  • Update and security settings, disk/device encryption
  • Locking, biometrics, backups
  • Minimizing app permissions, reducing tracking
  • Basic malware risk review

4) Privacy & exposure reduction (60–120 min)

  • Data minimization: what to delete/limit (profiles, public information, metadata)
  • Social media and communication practices (targeted scams/impersonation) - “What to do if someone writes about you / tries to blackmail you / your account is hijacked” action model

5) Family & assistants (optional, recommended) (60–120 min)

  • Security of close contacts (often the weakest link)
  • Shared rules: links, attachments, “urgent” messages, payment requests


Concrete results (what you take away)

  • One-page Executive Security Plan” (priorities + “do this”)
  • Account recovery and emergency action guide (printable + offline storage)
  • Checklist: “Travel,” “New Device,” “Suspected Hijack,” “Doxxing Threat”
  • Agreed-upon settings documented (what was changed and why)

Timeline (typical)

  • Quick hardening: (2–5 h total)
  • Extensive implementation + family + follow-up: (5–10 h)

Limitations

  • The package is defensive (accounts, devices, privacy, action models).
  • Does not include physical security or “counter-attacks”.
  • If something unusual is found (e.g., a criminal case/scam), I will direct you to the right channel and tell you what to collect as evidence.

Additional Services (typical for HTM clients)

  • 24/7 incident retainer (e.g., 1–4 h/month) for hijacking/blackmail or leak situations
  • Company key personnel package (same model for the management team)
  • Travel and border crossing security (device strategy + high-risk countries + “travel profile”)


How does it work?

  1. You explain your situation (Signal/SimpleX/email)
  2. You receive a package proposal + a quote
  3.  Implementation + clear instructions for the future

Describe your situation – I'll respond within 24 hours!

book assesStment!