Private
Staff

Personal assistants, household managers, nannies, drivers, security teams — trusted insiders with access to your most sensitive information. We ensure your staff are protected, trained, and vetted to the highest standard.

Request a Private Consultation

Rigorous Vetting

Comprehensive background checks and digital footprint analysis for all household and personal staff — identifying risks before they become threats.

Security Culture

Building a culture of security awareness within your household. We train staff to recognise threats, follow protocols, and respond correctly to incidents.

Access Governance

Implementing strict access controls for devices, accounts, and physical spaces — ensuring staff only access what they need, when they need it.

The threat landscape

Private staff represent some of the most exploited attack vectors in personal cybersecurity. They handle sensitive information daily, often on personal devices, with minimal security training. For adversaries, they are the path of least resistance.

Phishing Targeting Staff

Sophisticated phishing campaigns targeting staff email accounts — impersonating the principal, vendors, or service providers to extract sensitive information or gain system access.

Social Engineering of Assistants

Manipulating personal assistants through phone calls, emails, or in-person approaches — extracting schedules, travel plans, financial details, and access credentials.

Insider Threat

Disgruntled or compromised employees leaking sensitive information, photographs, documents, or access credentials — whether for financial gain, revenge, or coercion by external parties.

Staff Network Compromise

Staff using personal devices on household networks, introducing malware, connecting to unsecured Wi-Fi, or inadvertently bridging secure and insecure environments.

How We Help

Securing your household

01

Staff Vetting Protocols

Before any individual gains access to your household, we conduct thorough vetting that goes far beyond a standard background check. We analyse digital footprints, financial exposure, social connections, and potential coercion risks to ensure every hire is trustworthy.

  • Enhanced background checks including criminal records, financial history, and reference verification across multiple jurisdictions
  • Digital footprint analysis — reviewing social media activity, online associations, and public statements for red flags or conflicting information
  • Coercion vulnerability assessment — identifying financial pressures, personal circumstances, or connections that could make staff susceptible to external manipulation
  • Ongoing periodic re-vetting for long-term staff to detect changes in circumstances that may introduce new risks
  • Phishing simulation exercises tailored to realistic scenarios — testing staff ability to recognise and report suspicious emails, calls, and messages
  • Social engineering awareness training covering common manipulation tactics used against household and personal staff
  • Physical security protocols for handling deliveries, visitors, tradespeople, and unexpected contacts at the residence
  • Incident reporting procedures — ensuring staff know exactly what to do and who to contact when something suspicious occurs

02

Security Awareness Training

Your staff are your first line of defence — or your weakest link. We deliver bespoke training programmes that transform household employees from potential vulnerabilities into active participants in your security framework.

03

Access Management

Not every staff member needs access to everything. We implement role-based access controls across digital systems, physical spaces, and information flows — ensuring that each person can only access what is necessary for their specific role.

  • Role-based access policies for household systems — Wi-Fi networks, security cameras, alarm systems, smart home controls, and shared accounts
  • Separate network segmentation for staff devices — isolating personal devices from the principal's secure network and sensitive systems
  • Password and credential management — implementing secure password policies and multi-factor authentication for all staff-accessible systems
  • Access audit trails and logging — monitoring who accesses what, when, and from which device to detect anomalous behaviour early
  • BYOD (Bring Your Own Device) policy development — defining what personal devices can and cannot do on household networks
  • Managed device provisioning for staff who require access to sensitive systems — pre-configured with security controls and monitoring
  • Mobile device management (MDM) for staff phones and tablets — enabling remote wipe, enforcing encryption, and preventing data exfiltration
  • Departing staff device protocols — ensuring all access is revoked, devices are returned or wiped, and no data leaves with the individual

04

Device Policies for Household Staff

Every device that enters your household is a potential threat vector. Staff phones, tablets, and laptops can introduce malware, create unsecured network bridges, or become tools for data exfiltration. We establish clear policies and technical controls to manage this risk.

Your most trusted people are your
most exploited vulnerability.

Staff with access to your schedule, finances, and home are the first people adversaries target. Security awareness and proper controls turn your team from a liability into an asset.

Staff lifecycle security

Security must cover every stage of the staff relationship — from recruitment through to departure. We design protocols that protect you at every transition point, where risk is highest.

Onboarding Security

Comprehensive security briefings, NDA execution, device provisioning, and access setup for new hires — ensuring security is embedded from day one.

Ongoing Monitoring

Continuous review of staff digital behaviour, access patterns, and external exposure — detecting anomalies that could indicate compromise or insider threat.

Departure Protocols

Structured offboarding that revokes all access, recovers devices, updates passwords, and monitors for post-departure data leakage or retaliation.

Key questions

Common questions from principals about securing their household and personal staff against cyber threats.

01

What does your staff vetting process include beyond standard background checks?

Our vetting goes significantly beyond criminal records and reference checks. We conduct comprehensive digital footprint analysis, social media review, financial exposure assessment, and coercion vulnerability mapping. We look for inconsistencies in provided information, concerning online associations, and personal circumstances that could make an individual susceptible to external manipulation or bribery.

02

How do you deliver security training without it feeling burdensome to staff?

We design practical, scenario-based training that is relevant to each staff member's specific role. A personal assistant receives different training than a driver or a nanny. Sessions are concise, engaging, and focused on real-world threats they are likely to encounter. We reinforce training with periodic simulated phishing tests and brief refresher modules.

03

How do you manage staff who use personal devices for work?

We develop a comprehensive BYOD policy that defines acceptable use, implements technical controls on personal devices accessing household systems, and creates network segmentation to isolate staff devices. Where warranted, we provide managed devices with pre-configured security controls for staff who handle particularly sensitive information.

04

What happens when a staff member leaves our employment?

Our departure protocol is immediate and comprehensive. All digital access is revoked within hours, managed devices are recovered and wiped, shared passwords are rotated, and physical access credentials are deactivated. We also monitor for post-departure data leakage — watching for sensitive information appearing online or being shared with media outlets.

05

How should staff report a security incident?

We establish a clear, simple incident reporting chain that every staff member understands. This includes a dedicated secure communication channel, a designated point of contact, and a no-blame reporting culture that encourages early disclosure. Speed of reporting is critical — the difference between a contained incident and a crisis is often measured in minutes.

06

Do you provide ongoing security awareness or just initial training?

Security awareness is an ongoing programme, not a one-time event. We provide quarterly refresher training, monthly threat briefings relevant to household staff, periodic phishing simulations, and immediate alerts when new threat vectors emerge that are relevant to your household. We also conduct annual reassessments of all staff security posture.

Ready to secure your household?

Every engagement begins with a confidential conversation. Tell us about your household staff and we'll identify the vulnerabilities that need immediate attention.