Stay safe, keep working

IRL Cyber helps high risk individuals prevent cyber attack and unwanted surveillance by building a custom plan just for you.

Building a plan has five easy steps:

  • Photo of a man talking to someone via a video call on his laptop.

    1. Meet with us

    A 1:1 video chat with our senior consultant starts the discussion to find out about you, your concerns and goals. We'll go through what devices and services you use and understand how and why you use them.

  • Photo of random notes and planning on a whiteboard.

    2. Research & Analysis

    We research the technical details of your devices, develop a threat model and build a range of options for improving your cyber security.

  • A man pondering a decision.

    3. Decide what works for you

    In a second meeting we'll walk you through the options we've developed for you and help you weigh up their pros and cons.

  • A large hammer is about to hit some nails.

    4. Changes & Guidance

    We translate those options into a cyber security plan with step-by-step instructions specific to your devices and services. You can follow the instructions yourself, or we can work through them with you.

  • A life saving floatation device tied to the rail of a ship.

    5. Updates & Support

    Our support subscription sends you personalised instructions telling you exactly what you need to do to keep your devices secure without wading through technical jargon. We're also here to answer any cyber security questions you run into.

Get in touch:

[email protected]