1.
Cyber Hygiene Audit
▪ Device and account security check
▪ Review of password practices
▪ Exposure scan (what info is publicly visible)
▪ Google Workspace safety check
2.
Account & Data Protection
▪ Multi-factor authentication setup
▪ Secure password manager setup
▪ Encrypted file + photo storage workflows
▪ Safe data backup system
3.
Google Workspace Security
▪ Admin panel hardening
▪ Role-based access setup
▪ Email security + anti-phishing settings
▪ Secure drive + folder permissions
4.
Employee Safety Training
▪ Phishing awareness
▪ Safe device practices
▪ Job site photo + customer data etiquette
▪ Personal device safety for work use
Initial Consultation
We start with a one-on-one consultation to understand your business or household setup. This is a practical, judgment-free conversation where we review your devices, accounts, workflows, and current security practices. You don’t need to prepare anything in advance — I’ll guide the process and explain everything in clear, non-technical language.
You’ll leave this call with a clear understanding of where you’re already protected, where there may be risk, and what support would be most helpful moving forward.
Month 1 — Setup & Alignment
If we move forward, the first phase focuses on securing your foundation. This includes tightening account access, setting up multi-factor authentication, organizing permissions, protecting data storage, and ensuring your Google Workspace or home systems are configured safely and correctly.
Everything is done intentionally and with minimal disruption to your daily work or home routines. You’ll always know what’s being changed and why.
Monthly Cycle — Smooth, Predictable Support
Cybersecurity is not a one-time task. As part of ongoing support, I provide regular check-ins, updates, and adjustments to keep your systems protected as your business, team, or household evolves. This may include reviewing new devices, improving workflows, updating access permissions, or responding to emerging security concerns.
Support is predictable, proactive, and tailored to your actual usage — not generic or over-engineered.
Quarterly Strategy — Staying Ahead
An important part of cybersecurity is understanding how to stay safe day-to-day. I provide simple guidance and training so you and your team (or family) know how to recognize scams, handle sensitive information, and use technology responsibly without fear or overwhelm.
The goal isn’t restriction — it’s confidence.