Choose a Plan
Media reports citing new data breaches and cyber security flaws are becoming more frequent, so it's important that you take the necessary steps to protect yourself. However knowing what to do isn't always clear. That's why we have created a range of tools to help you not only improve your online safety, but your awareness of all things cyber security.
Choose a plan
We offer a range of plans to suit different needs. Each plan provides deeper
into your cyber security risks, threat alert updates and more.
Basic protection to help keep you safe from common threats.
Advanced protection for individuals with a larger digital footprint.
Protect your family and all your devices with our Ultimate home plan.
- Cyber Security Score to help you understand exactly how safe you are online and potential areas of risk
- Dashboard containing your Score, reports and recommended actions to help reduce your cyber security risks
- Ability to add and protect family members, securing your home's entire digital footprint
- Education and threat alerts, direct to your inbox
FREE RESOURCES TO KEEP YOU SAFE ONLINE
We protect you from Cyber crime through our easy to use dashboard allowing us to notify you instantly when you are at risk online
The Ultimate Guide to the Dark Web
The Dark Web: is it as ominous as it sounds? In this guide you'll discover how the Dark Web came into existance is used by cyber criminals.
How to tell if a Google Play app is fake
For years, reports citing malicious Android apps have been in the headlines. Apps have been known to deliver malware to devices, mine sensitive data and bombard users with ads without their consent. So how do you spot them?
Netflix, Spotify & EA: discover the most ‘cyber-attacked’ brands
The number of high-profile data breaches hitting the headlines has made the public more conscious about the security of their online data and personal information than ever before. In order to get a better idea of where consumer data may be vulnerable to theft, we wanted to investigate the brands most commonly ‘attacked’ by cyber criminals.