Skip to content

Cyber Protection Package

In today's interconnected digital landscape, VIP’s and prominent individuals are increasingly vulnerable to sophisticated cyber threats, notably phishing and vishing attacks. These malicious tactics aim to exploit personal information, leading to substantial financial losses and reputational harm.


The High Stakes of Social Engineering

High-Profile Social Media Account Compromises

In 2020, the accounts of high-profile individuals such as Elon Musk and Joe Biden were compromised using vishing.

Attackers used social engineering techniques to gain access to internal systems, this highlights the effectiveness of vishing in targeting prominent figures.

 

Financial Sector Vishing Scams

Dozens of banks, cryptocurrency exchanges, and investment portfolios have experienced vishing attacks aimed at stealing funds and cryptocurrency from high-net-worth customers.

Attackers impersonated banking and exchange IT staff to deceive customers into revealing credentials, leading to unauthorised access to customer accounts and funds.

Hacker-1

Types of Phishing and Vishing Attacks Among Prominent Individuals

Phishing: Phishing remains the most common form of cybercrime. In 2024, 83% of UK businesses that suffered a cyber-attack reported phishing as the attack type. Given the typical Black Label customer often hold prominent positions within these organisations, they become prime targets for such attacks.

Vishing: ​According to CrowdStrike's 2025 Global Threat Report, voice phishing (vishing) attacks surged by 442% between the first and second halves of 2024. This sharp increase underscores a significant shift in cybercriminal tactics, with adversaries increasingly employing phone-based social engineering techniques to illicit personal information that can be used to compromise individuals accounts.


Packages & Pricing

Silver

Designed for individuals looking to understand their online accounts weaknesses.

£1,000

Silver

  • Comprehensive Phishing exercise of up to 1 social media account and 1 email account
  • Vishing exercise to attempt to illicit further interaction to aid the attempted compromise
  • Detailed report with outcomes and recommendations

Gold

Ideal for established individuals with a considerable online presence seeking to shore up their online footprint

£1,600

Gold

  • Comprehensive Phishing exercise of up to 3 social media accounts and 1 email account
  • Vishing exercise to attempt to illicit further interaction to aid the attempted compromise
  • Online and dark web threat hunting for personal information and media
  • Detailed report with outcomes and recommendations and DMCA (take down notice) template

Platinum

Tailored for prominent individuals whom compromise would have a significant impact

£2,500

Platinum

  • Comprehensive Phishing exercise of up to 3 social media accounts and 1 email account
  • Vishing exercise to attempt to illicit further interaction to aid the attempted compromise
  • Online and dark web threat hunting for personal information and media
  • One to one Q&A phone call with cyber security expert
  • Detailed report with outcomes and recommendations and DMCA (take down notice) template

Echo Secure AI Fortified Laptop

giorgio-trovato-8krX0HkXw8c-unsplash
  • Brand New M4 MacBook Pro

  • 10-Core CPU

  • 10- Core GPU

  • 16GB Unified Memory

  • 512GB SSD Storage

  • Bespoke Customisation and Configuration By Echo Secure AI

The Echo Secure AI Fortified Laptop is configured with a significantly higher level of security than industry standard.

It follows the Echo Secure AI laptop build guidelines, which are developed using a combination of CIS (Center for Internet Security) and NCSC (National Cyber Security Centre) benchmarks for secure device configuration.

Key Features

Secure User Accounts

Separately configured user accounts, one for typical internet and social media use, and a locked down, discreet and secure account for financial, important or private matters.

Metadata Removal

Inbuilt Tool to remove metadata from images before posting to social media, ensuring location and other data is scrubbed for personal privacy.

Login Dongle

A secure dongle key included. Required to use the secure account, this adds an additional layer of security, ensuring no one other than identified individuals can access the device.

Secure File Storage

A secure file container is provided within the protected account, meaning that any stored documentation can only be accessed or recovered by the owner.

Camera Deactivation

Optional hardware-level camera deactivation, enabling users to easily disable the webcam when not in use.

Managed Service

A managed service in which we monitor the device's security status, ensuring that updates and security patches are applied promptly. This includes ongoing checks to maintain system integrity and keep ahead of patches and any updates.


Enquire Today