Exposed Affiliates

Your security is only as strong as the people around you. We extend protection to every point of vulnerability in your inner circle.

Why affiliates matter

Adversaries rarely attack principals directly. They target the people around them — family members, household staff, business associates — who often lack any cybersecurity awareness or protection. A single compromised phone in your inner circle can unravel everything.

01

Inner Circle

Family & Spouses

Loved ones are the most common entry point for adversaries. We protect spouses, children, and extended family from targeted attacks.

Vulnerability

  • Social engineering via social media
  • Location tracking through devices
  • Exploitation of children's accounts

Our Response

  • Family device hardening
  • Social media privacy audit
  • Location protection protocols
02

Household & Personal

Private Staff

PAs, nannies, drivers, and household staff handle sensitive information daily — often without any security training.

Vulnerability

  • Insider threat & data leakage
  • Phishing targeting staff email
  • Physical access exploitation

Our Response

  • Staff security awareness training
  • Access control implementation
  • Vetting & background checks
03

Trusted Advisors

Business Associates

Lawyers, accountants, and wealth managers hold the keys to your financial life. Their security is your security.

Vulnerability

  • Third-party data breaches
  • Compromised advisory communications
  • Supply chain attacks

Our Response

  • Third-party risk assessment
  • Secure communication channels
  • Vendor security review
04

Social & Professional

Wider Network

Board colleagues, social connections, and professional contacts can be compromised to reach you indirectly.

Vulnerability

  • Impersonation of known contacts
  • Network mapping for social engineering
  • Compromised shared platforms

Our Response

  • Network exposure analysis
  • Impersonation monitoring
  • Contact verification protocols

A chain is only as strong as its weakest link

The people closest to you are your greatest asset — and your greatest vulnerability. We ensure neither is exploited.

Our Approach

From exposure to protection

Every principal engagement follows our proven four-phase methodology — designed to move you from exposed to protected with precision and zero disruption.

01

Assess

Understand Your Exposure

We conduct a comprehensive personal threat assessment — mapping your digital footprint, identifying vulnerabilities across devices, networks, and personnel, and evaluating your unique risk profile.

02

Protect

Deploy Tailored Defences

Based on your assessment, we design and implement a bespoke security architecture — from digital footprint reduction and device hardening to communications encryption and staff awareness training.

03

Sustain

Continuous Vigilance

Security is not a one-time event. We provide ongoing monitoring, threat intelligence, periodic reassessments, and 24/7 incident response — evolving your protection as your life and risk profile change.

Protect your inner circle

Every engagement extends beyond the principal. Tell us about your circle and we'll identify the exposure points that need immediate attention.