Current Services
Use one the following buttons to subscribe today, or read through this page to learn more before subscribing.
Individuals and Heads of Household
Our mission is to help you establish and defend a healthy & secure way of life in this digital age.
Our curated security content for Individuals and Households is designed to help you at home defend yourself and your family. The threats online are very real. From online influence that can lead to radicalization, to the AI revolution sweeping our society, to email fraud scams, identity theft scams, and even malware that can take over your computer or disrupt your life, we are here to equip you with the armor you need to defend against all the threats we know of.
The Problem
We live in a world powered by Internet connections that connect our physical reality to a digital one. From communicating with friends & family, doing business, managing our finances and personal health, paying for goods and services, scheduling events, driving our cars, booking tickets, accessing entertainment, and even education - nearly everything we do is done via digital means that traverse the public Internet.
As we have moved to the Internet to manage our lives, the criminal world has also moved and has developed tools, techniques, and procedures to abuse what is meant for good, for their personal gain.
The underground economy where criminals exchange goods and services is estimated to be valued at $100 billion (in sell-able commodities), and national damages from cybercrime are expected to exceed $10.5 trillion in 2025. The problem is real and it is huge.
But it’s not just about financial or material impact. There are many predators in the digital world who threaten humans physically. A recent report from the United Nations stated that 40% of victims of human trafficking were first solicited online.
The Internet is also filled with every kind of human expression imaginable, which unfortunately includes the grotesque, immoral, and radical. As we engage Internet based resources in good faith, we risk exposure to harmful content and individuals who can influence our minds and draw us into activity that will poison our souls. The sad reality is, online radicalization is very real and it is very common. Read our free article on Protecting Hearts and Minds from Influence for more.
And it’s not only a threat from criminal and immoral activity. Online service providers use tracking technology to monitor and profile your Internet activity to develop an understanding of who you are, what you are interested in, who you converse with, what you engage online, and what triggers your engagement. This profile is used to manipulate you by feeding you curated content meant to influence your mind and actions. While originally this was meant for targeted advertising, we know that platform providers now use this capability to attempt cultural and political revolution.
You are the target. You, your behavior, and your information are the prized commodity. Your resources, accounts, data, access, even your online profile and habits can all be stolen and monetized by criminals resulting in damages to your reputation, finances, and continuity of life, raising the cost of life for all of us, as businesses work to prevent and recover from data breaches.
This disregard of our intrinsic value as individuals works to diminish each of us.
Practive Security exists to enable individuals, families, organizations, and small businesses to engage the Internet safely, securely, and in a healthy manner. We provide education, consulting, investigation support, and practical tips covering everything you need to know about Internet based threats and how to avoid becoming a victim of crime or abuse.
Our Answer
Advisories and Tips
The threats are constantly changing. There are always new threats that are surprising people and with them new questions that arise.
What should I watch for? Can I trust this email? Can I trust this app? Is this text message legitimate? Should I choose Apple or Microsoft? Is iPhone iOS or Android more secure? Do I really need AntiVirus? What product works best? What is a VPN? Is Social Media safe for my teen?
These are some of the many questions we receive on a regular basis. The Practive Security Advisories and Tips content is a library of articles we publish that answer these and many other security related questions, and also provide you with heads-up alerts and descriptions of threats and adversary tactics so you know what to watch out for. New content is published regularly and subscribers can submit their own questions for consideration in a future advisory or tip.
Security Strategies and articles
Practive Security maintains a library of articles that are designed to educate you and help you establish the right mindset to build effective security in your content. In our strategic articles, we review in detail various topics of concern and provide strategies to adopt as well as specific actions you can take in response. These articles range from detailed analysis of specific issues, to strategic forward thinking pieces, all designed to provide you with the level of understanding needed to defend your digital way of life today and into the future.
Some of our strategic articles are also available on our Substack page. Topics of keen interest and import to us are often released for free on Substack or otherwise summarized there.
Security Assessments for Individuals or Households
Practive Security provides a personalized review of your Internet engagement profile, to help highlight strengths and also opportunities to implement new strategies to improve your security posture. If you are curious about where you stand in general Internet safety, this is a good place to start. We will review the technology you use, why and how you leverage the Internet, security tools you have in place, your devices themselves, and other related topics in order to build an overall profile of your digital life. From this profile, we will review best practices that will fit your lifestyle and help you raise the bar for personal defense.
Individual Assessments are scheduled on an individual basis and include:
An assessment questionnaire
Professional review by Practive Security experts
A report that describes your digital profile with identified risks
Recommendations for improvements
A one on one meeting to review the assessment and answers questions
Security Seminars, Education, AND Training
Practive Security education content including seminars and trainings are designed to equip you with knowledge and practices to empower you to manage your digital life safely and security. Our education focused content will take you deeper into the security world, focusing largely on ensuring you understand our perspective on cybersecurity and why we recommend the things we do. Following our education content will empower you to naturally navigate the digital age.
Threat Briefing
Practive Security introduces you to the ugly reality we face on the Internet. It is a world of unchecked organized cybercrime, nation-state threat actors, predators & traffickers, political activists, malicious influencers and other online threats. We present a profile of each of these threats including their motivations and how they intent to cause you harm, along with an overview of their most common techniques, tools, and procedures they employ in their attacks and scams.
In addition to these traditional threats, you will be introduced to the world of online influence and coercive tactics used against consumers and individuals, often by providers we trust, so you can protect your mind and understand how to best discern the truth in a world of lies.
The goal of this training is simple: understand the battlefield that is humanity on the public Internet.
Best Practices for Individuals
At Practive Security we believe cybersecurity includes protecting not only your property, but also your mind, your heart, and your soul. Our security best practices cover all these so you are wholly prepared for a safe and healthy digital life. Using your knowledge gained through the Threat Briefing, Practive Security teaches members effective countermeasures we can all employ to defend against the threats we face. We teach how to establish the proper mindset, strategy, and what practical actions you need to adopt in your personal defense. Specific tools and recommendations will be shared for those who are looking for help making the most practical decisions.
Best Practices for Heads of Households
Practive Security teaches Heads of Households how they can secure their home; that is the network and Internet connected devices within your residence, as well as extending security to anyone who is using your home resources to connect to the Internet. We will discuss home network technology, configurations, and additional resources you can leverage that will keep you and yours safe.
This session will heavily focus on the head of the household and parents, to ensure you are taking all the prudent steps to shield your children.
Building a Healthy Digital Life
Practice Security recognizes that parents need help in teaching their children how to prepare for a safe and healthy life in this digital age. We teach security fundamentals and best practices for those who have minimal or no experience with the Internet. This training is intended to be a how-to guide for setting up your digital presence to adopt security of your heart, mind, soul, body, and property at the foundational level, with strategies that will serve you for years to come.
Renewing a Healthy Digital Life
Many of us have been engaged in the Internet for so long we have likely adopted bad habits and overlooked things we should have been paying more attention to. It’s also likely we have abandoned Internet property or scattered our data through various service providers. If you are in this camp, you are likely at the greatest level of risk. Practive Security teaches how we can each take a step back at our Internet experience, identify what is going well and what needs work, and how to re-establish a healthy digital life.
Businesses and Organizations
Our mission is to help you understand the threat and to join organizational priorities with operational capabilities to establish and operate cybersecurity solutions that are effective and right for you.
Most businesses want to be focused on delivering goods and services to their customers. That is what they know, that is why they exist, and that is their priory. Knowing that there are threat actors who are constantly seeking opportunities to interrupt and abuse their work or prey on them or their customers can be daunting. Knowing what to do about it can seem overwhelming. It can be easy to dismiss this threat as not relevant, or too big of a problem to solve; “they won’t target me,” “there’s nothing I can do about it anyway.”
The reality of the professional world, is that the threats are many, they are well resources, they are aggressive, and they expand in scope and scale beyond what individuals are targeted with. Threat actors know that businesses have more resources they can abuse, more information they can gather at once, and a higher likelihood of success by targeting organizations that cannot tolerate disruptions.
In addition to that, many businesses have limited budgets that they have to spread between operating as an organization while adhering to regulated standards so they can deliver their products and services to customers. Reviewing the menu of cybersecurity products and services presented by the industry can itself appear as an overwhelming tax on business priories and finances.
At Practive Security, we have decades of experience helping enterprises understand the threats they face, and building effective cybersecurity programs to counter them. Our focus is on building right-sized solutions that work, tailored specifically to the risks organizations actually face. Learn more on our Services page.
Curated articles and content
Advisories
We watch the headlines and information sources to maintain awareness of current threats. When we spot something that we believe needs your attention, we publish advisories in written form that summarize the situation, provide our perspective, and give you practical tips to defend your organization.
Strategies
Based on our decades of experience defending businesses and organizations, we publish articles that provide strategic perspectives on all things cybersecurity for professional contexts. Our strategies are meant to empower you with the right mindset to make effective decisions for your organization, and we always provide recommendations from what we have seen actually works, along with warning as to what we have seen doesn’t.
Some examples of our strategic content can be found on our Substack page. We cover topics like best practices for organizational security, how to structure your security team & capabilities, thoughts on cloud security, tips for hiring the right security professionals, guidance on how to develop security policies and plans, and more.
Templates
In addition to providing you with strategic articles that describe how to organize and conduct effective security programs, we provide you with template documents that you can customize to meet your needs. From policy documents, to security organization mission & strategy charters, to incident response plans, and operational playbooks, we have content to get you started.
Lessons Learned
Having decades of enterprise security experience under our belt, we have stories to tell! We hope our lessons learned can save you the pain that we have endured and can enable you to build on a foundation of success.
Security Assessments
Security Assessments for Your Business
Primarily designed for small businesses or organizations operating in a similar context, our Security Assessment service is designed to construct a security review specific to your organization’s unique profile and needs.
The assessment starts with interviewing key staff to understand your business and it’s position relative to threats and industry regulations or best practices. This will enable the assessment team to identify the right caliber of security program that is ideal for you.
We will review your people, process, and technology and compare what you have in place to what we believe is necessary for an effective defense posture.
We will also provide a custom tailored threat briefing to your staff in a mini-seminar, to ensure your front-line defenders understand the context of the cyber battlefield. This briefing will provide practical examples of what you should expect from cyber attacks, how to mitigate or prevent their impact, and what to do in the event a compromise occurs.
Security Assessments are typically one week engagements although they can be split across time to accommodate business schedules and staff availability. At the conclusion of the assessment, you will be provided:
A threat profile that outlines the scope of cybersecurity concerns that relate to your organization.
A copy of the threat briefing delivered to your staff.
The results of the assessment including strengths and weaknesses, and recommendations for improvement.
An overall security strategy that can be adopted by your organization for planning purposes.
Smaller scale security assessments can be provided for individuals or families as needed. These are scoped on an as-needed basis and may include any feature of the Standard Security Assessment.
On Demand Support
If you are an individual, head of household, or business owner and need to consult with Practive Security experts, we offer on-demand support. Fill out a contact form and describe the nature of your questions or issue, and we will scope an engagement that meets your needs. We would be happy to help you with things like:
Responding to a security incident
Reviewing a scenario and providing you with a custom response
Answering general questions
Providing strategic suggestions or related consulting on security for businesses
Cybersecurity Professional consulting
We believe the Cybersecurity mission is a noble one, and it is a mission that can be successful. Check out our blog on challenging the mythology of the modern adversary on our Substack page here.
As a premium service for business customers, we offer a consulting retainer service where customers purchase dedicated support for a negotiated period of time, in hours. These consulting hours can be used on-demand for the duration of time available, and can be used for a broad scope of work or scenarios. Customers needing on-demand consulting may need:
Guidance to help build security strategy
Help solving specific security problems
Tailored threat intelligence and briefings
Evaluating and selecting security hardware or software solutions
Defining security-related job descriptions, interviewing candidates, and selecting new staff
Policy, process, and procedure writing
Security training for staff including best practices, investigation methods, IR, threat hunting, and technology optimizations
Support in preparing for and conducting regulatory compliance audits or other capability attestations
Executive briefings and CISO-level strategic support
Organization guidance for security programs