We focus on your needs. If you're facing digital security challenges or need expert advice, we're here to help. Our focus is on providing practical solutions tailored to the specific needs of non-governmental and media organizations, human rights defenders, journalists and activists.
Ongoing consulting and support
We offer comprehensive consulting and support services for risk assessment and risk management, providing guidance and advice at every stage of the process. Our commitment extends beyond mere consultation, as we strive to build long-term partnerships with our clients.
Technical expertise
We provide comprehensive assistance in implementing recommendations, especially when it comes to leveraging technical expertise for existing equipment and software.
Digital security audits
Digital security audits include risk modeling, examination of devices, servers, networks, and accounts, interviews with staff, and tailored recommendations.
IT procurement guidance
We offer specialist counsel to ensure that organizations and individuals make informed decisions and obtain the best value when acquiring IT goods and services. Our assitance helps optimize costs, ensure quality, manage risks, comply with regulations, and foster innovation.
Web security and DDoS mitigation
Web security assessments, audits, consulting, and support. Assistance in defending against DDoS attacks and finding performance bottlenecks.
Censorship circumvention
Creating website mirrors on Cloudfront and other platforms, setting up proxies and providing commercial VPN for free
General IT support
General system administration support and consulting, including network setup, guidance on hardware and software selection, and task delegation to IT specialists.
Help with malware
Analysis of smartphones for threats like commercial malware with varying levels of scrutiny.
Incident analysis
We assist with incident analysis, covering scenarios from "determining the method of a cyber attack" to "actions to take if a smartphone is lost" and "handling inappropriate or sensitive information posted online".
Google Workspace and Microsoft 365
Consulting on information system architecture, covering email, cloud (f.e. as Google Workspace and Microsoft 365) collaboration platforms and corporate antivirus solutions.
Response protocols
Facilitation in the development of response protocols, detailing assigned roles and actions in response to specific incidents.
Learning and conferences
We organize security conferences to foster experience sharing.