This post looks into the viability of building an appliance to provide encryption and cloud services for high risk individuals.
We can help you understand who might be listening and the best way to secure your online communications.
Or how the UN convinced me to start the best company to help with your cyber security.
Check out how we use threat modeling to help our customers as secure as possible, without getting in the way of their important work. Paranoid enough, but not too paranoid.
Over the last decade or so it has gotten easier and easier to setup a website, but DDOS attacks are making life difficult for independent journalists and news organizations by providing a cheap and reliable way to knock them offline.
One of the most important things we do with our clients is to produce a Cyber Security Plan for them. This plan contains all of the personlized recommendations we make for you and customer and documents the technical information and details of your situation. Since most people haven't seen a security plan we decided to publish and example plan so you can better see how it helps you secure your digital footprint and be confident you can use your devices without jeopardizing your security.
Here at IRL Cyber we love all the gory technical details of cyber security, but we're just self aware enough to know that's not normal. That's why we wrote the Top 3 Cyber Security Fixes for Human Rights Defenders Checklist.
We’ve released the Top 3 Cyber Security Fixes for Business VIPs Checklist. It’s specifically tailored to the threats Business VIPs are most likely to encounter and the quickest ways to minimize them.