Learn More    

Cyber Made Simple with 24/7 Family Cyber Services

Protect

A cyberattack can cause devastating financial and reputational damage. We protect individuals and families with powerful threat monitoring, personalized alerts and education.

Still think this is not a big deal? Your information will be used to make purchases, commit crimes, request new credit cards, provide medical care to others, and more.

All the charges are in your name. And you have to prove it wasn't you! It isn't easy. The criminals have so much information about you, and they have much more experience in it than you do.

Every online action puts your information at risk.
Find Out More  

Respond

Experienced 24/7 Cyber Advocates assist in responding to threats and attacks. Automated cyber alerts and actions are provided to mitigate risks and minimize disruptions.
Find Out More  

Recover

After a cyber event, we work with you to repair damage, identify additional cyber vulnerabilities, improve your cyber protections and get things back to normal.
Find Out More  

Insights

What is happening in cyber

The Real Cyber Risks

The news tends to blame hackers for cyber breaches. But research shows there is another cause for over 80% of breaches. This Insight looks at that cause, how it occurs, and suggests ways to be safer. 

 

Hacking not the real cause of breaches

New malware justifies Appleā€™s locked-down security strategy

Apple aims to keep tight control over its environment. This has led to lawsuits to force acceptance of app stores other than Apple’s. In this case browser extension apps in the other stores were corrupted. Anyone downloading apps from the non-Apple store got malware in the app that could steal your data.  

 

Apple's tight security vindicated

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

Ransomware attackers are exploiting Amazon Web Services own encryption to encrypt user data. If the demanded ransom is not paid within 7 days, the data is deleted by the attackers.  

 

AWS encryption exploited by ransomware attackers

Get in touch

We'd love to hear from you

An email is required.
Email is not valid.
A phone number is required.
A message is required.
Thank you for your message!
We're sorry, we could not send your message.