Best for you if you want to quickly identify the most important risks and get clear next steps.
- What it includes
- Current-state assessment
- Key risks and priorities
- Clear recommended actions
- What it does not include
- No remote access
- No password sharing
- No unnecessary technical jargon
1) Basic Security (individual)
Goal: get accounts and devices into basic shape quickly.
- Contents:
- Passwords + password manager setup
- 2FA for the most important accounts (email, social media, bank)
- Updates and basic protection (Windows/macOS/iOS/Android)
- Browser and privacy settings (basic)
- "Basic locks in order” checklist + recommendations for the future
2) Scam Protection (individual / to support loved ones / whole family)
Goal: reduce the risk of scams in daily life.
- Contents:
- Signs of a scam and a practical action model (10–15 “rules”)
- Secure email and browser settings
- Data breach check + actions (if breaches are found)
- Secure payment and login practices
- One-page “how to act” guide
3) Family Package (parents + children's devices)
Goal: make children's devices and daily social media practices safer.
- Contents:
- Parental controls / screen time / app limits (iOS/Android)
- Privacy settings (TikTok/IG/Snap basics)
- Location and sharing settings
- Family’s shared “rule list”
- Family-specific settings list + age-appropriate recommendations
4) Small Business Basic Security
Goal: a clear minimum standard for the company's accounts and devices.
- Contents:
- Company email and account security (2FA, recovery, roles)
- Basic device policy (updates, encryption, locks)
- Tidying up file sharing and permissions
- Basic backup model
- "Company Basic Policy" document + action list
5) Assessment (a quick start for everyone)
Goal: you get a clear picture of the current situation and the next steps.
- Contents:
- 30–60 min assessment + prioritization of risks
- 3 most important fixes + recommended package
6) High-Threat Model Protection
For who: CEOs, journalists, and public figures. A quick start and a clear plan.
Goal: minimize account takeovers, targeted scams, doxxing, data leak risks, and loss of privacy – practically and quickly.
Delivery Model: Start via a “secure channel” (Signal/SimpleX/Proton), no sensitive information via email.
1) Threat modeling and risk assessment (60–90 min)
- Who could be the attacker (opportunist / targeted / insider / stalking)
- What is most critical (email, social media, cloud services, bank, PR/reputation crisis, family)
- Prioritized “fix these 5* first” list
2) Account security to a “cannot be hijacked” level (90–180 min)
- Password manager + strong unique passwords
- “FIDO2/passkey / security keys” (recommendation), get 2FA set up everywhere
- Recovery channels: backup email, phone numbers, recovery codes, “break-glass” plan
- Email hardening (because it's usually the key to everything)
3) Device hardening (1–3 devices, 90–180 min)
- Update and security settings, disk/device encryption
- Locking, biometrics, backups
- Minimizing app permissions, reducing tracking
- Basic malware risk review
4) Privacy & exposure reduction (60–120 min)
- Data minimization: what to delete/limit (profiles, public information, metadata)
- Social media and communication practices (targeted scams/impersonation) - “What to do if someone writes about you / tries to blackmail you / your account is hijacked” action model
5) Family & assistants (optional, recommended) (60–120 min)
- Security of close contacts (often the weakest link)
- Shared rules: links, attachments, “urgent” messages, payment requests
Concrete results (what you take away)
- One-page Executive Security Plan” (priorities + “do this”)
- Account recovery and emergency action guide (printable + offline storage)
- Checklist: “Travel,” “New Device,” “Suspected Hijack,” “Doxxing Threat”
- Agreed-upon settings documented (what was changed and why)
Timeline (typical)
- Quick hardening: (2–5 h total)
- Extensive implementation + family + follow-up: (5–10 h)
Limitations
- The package is defensive (accounts, devices, privacy, action models).
- Does not include physical security or “counter-attacks”.
- If something unusual is found (e.g., a criminal case/scam), I will direct you to the right channel and tell you what to collect as evidence.
Additional Services (typical for HTM clients)
- 24/7 incident retainer (e.g., 1–4 h/month) for hijacking/blackmail or leak situations
- Company key personnel package (same model for the management team)
- Travel and border crossing security (device strategy + high-risk countries + “travel profile”)
How does it work?
- You explain your situation (Signal/SimpleX/email)
- You receive a package proposal + a quote
- Implementation + clear instructions for the future