Consulting services
With a lifelong passion for cybersecurity, I've learned a lot along the way. Today, I'm offering to pass this knowledge on to you, whether you're an individual seeking to regain a certain level of privacy and security, or a company looking to protect its infrastructure from cyber-attacks.
These are not guides or online training courses, but genuine interactive consulting services. You describe your needs, constraints and preferences, and I give you solutions tailored to your situation.
Personal privacy & security π΅οΈ
Would you like to put an end to the constant collection of your personal data by GAFAMs and regain your right to privacy? Do you want to step up the security of your electronic devices ? I can guide you in this complex journey.
Privacy:
Your data are constantly retrieved in many different ways π. I help you to stop that by acting at all levels β :
Online services
Communications
Web browsing
Applications
Operating systems
Hardware
No more data harvesting without your consent. Turn your digital space into a safe place π±.
Security:
Security hardening is essential to ensure privacy. Your data need to be carefully controlled π, your communications have to be encrypted π, your devices must be near-impossible to hack π‘οΈ.
I will help you to reach this goal by implementing various security measures:
- Hardened web-browsing
- Encrypted messaging
- Application sandboxing
- Physical security
- And moreβ¦
Freedom:
The use of FLOSS (Free/Libre and Open-Source Software) is mandatory in personal privacy and security. How could you trust a software for such critical missions if you can't even read their source code π?
Every software I recommend are FLOSS, and consequently, free πΈ. Anybody can read their source code and build their own local copy of it ποΈ. They are developed and reviewed by the community, and used by thousand of people worldwide. They are the most trustworthy software for privacy & security conscious individuals β .
What you are going to achieve:
In concrete terms, here's a sample of what you could change (depending of course on your current status):
- Limit the amount of personal data collected online
- Switch to a private messenger
- Use a robust password manager
- Install/harden a Linux distribution
Enterprise security π‘οΈ
Are you afraid about data leaks & ransomware attacks? Would you like to protect your IT infrastructure against various cybercriminal attacks? I could help you to deploy advanced security measures to protect your internal systems as well as your production infrastructure π.
Security solutions:
Isolation
Granular isolation of all components of your infrastructure is the key to mitigate cyberattacks.
Least privilege
Reduce the action field of every actors help to prevent vulnerabilities exploitations and pivoting.
Authentication
Hardened authentication is the first barrier preventing criminals to compromise your systems.
Administration
Sane & careful administration procedures is crucial to maintain security over the long term.
Advanced protection against:
- Ransomware
- Data leaks
- Social engineering
- Application vulnerabilities
- Pivoting
- Network hijacking
Do it yourself?
You don't want to give me access to your infrastructure? π No problem, I can also give you detailed instructions π§Ύ and quality support βοΈ so that you can deploy security measures yourself.