
Exposed Affiliates
Your security is only as strong as the people around you. We extend protection to every point of vulnerability in your inner circle.
Why affiliates matter
Adversaries rarely attack principals directly. They target the people around them — family members, household staff, business associates — who often lack any cybersecurity awareness or protection. A single compromised phone in your inner circle can unravel everything.
Inner Circle
Family & Spouses
Loved ones are the most common entry point for adversaries. We protect spouses, children, and extended family from targeted attacks.
Vulnerability
- Social engineering via social media
- Location tracking through devices
- Exploitation of children's accounts
Our Response
- Family device hardening
- Social media privacy audit
- Location protection protocols
Household & Personal
Private Staff
PAs, nannies, drivers, and household staff handle sensitive information daily — often without any security training.
Vulnerability
- Insider threat & data leakage
- Phishing targeting staff email
- Physical access exploitation
Our Response
- Staff security awareness training
- Access control implementation
- Vetting & background checks
Trusted Advisors
Business Associates
Lawyers, accountants, and wealth managers hold the keys to your financial life. Their security is your security.
Vulnerability
- Third-party data breaches
- Compromised advisory communications
- Supply chain attacks
Our Response
- Third-party risk assessment
- Secure communication channels
- Vendor security review
Social & Professional
Wider Network
Board colleagues, social connections, and professional contacts can be compromised to reach you indirectly.
Vulnerability
- Impersonation of known contacts
- Network mapping for social engineering
- Compromised shared platforms
Our Response
- Network exposure analysis
- Impersonation monitoring
- Contact verification protocols

A chain is only as strong as its weakest link
The people closest to you are your greatest asset — and your greatest vulnerability. We ensure neither is exploited.
Our Approach
From exposure to protection
Every principal engagement follows our proven four-phase methodology — designed to move you from exposed to protected with precision and zero disruption.
Assess
Understand Your Exposure
We conduct a comprehensive personal threat assessment — mapping your digital footprint, identifying vulnerabilities across devices, networks, and personnel, and evaluating your unique risk profile.
Protect
Deploy Tailored Defences
Based on your assessment, we design and implement a bespoke security architecture — from digital footprint reduction and device hardening to communications encryption and staff awareness training.
Sustain
Continuous Vigilance
Security is not a one-time event. We provide ongoing monitoring, threat intelligence, periodic reassessments, and 24/7 incident response — evolving your protection as your life and risk profile change.
Protect your inner circle
Every engagement extends beyond the principal. Tell us about your circle and we'll identify the exposure points that need immediate attention.