After you enroll in the Program you’ll receive an email with next steps

JOIN THE SLNT® PHONE DETOX PROGRAM

Free Cybersecurity and Privacy Guide

100% FREE

When was the last time you did a Cybersecurity and Privacy Checkup?

It goes without saying, cybersecurity and privacy are top of mind for most of us because of the constant threat of ransomware, data breaches, and cyber-attacks we hear about constantly in the news.

In this free 4-week cybersecurity and privacy challenge, I’ll help you up your cybersecurity and privacy game by challenging you to create new habits to help you stay more secure and private with everything that you do online. 

Each week I'll present a challenge designed to increase the security and privacy of your online accounts, personal data, and the technology you use every day. At the end of the 4-week challenge, you’ll be more security and privacy aware, ready to defend your personal information from falling into the hands of attackers.

tom eston shared security
Tom Eston

Cybersecurity Professional and Privacy Advocate

Founder and Host of the Shared Security Show

The program

This free program is designed to focus on the cybersecurity and privacy best practices that will protect you from attackers looking to steal your private information. Focusing on the four areas in this program is your best defense from the latest cyber and privacy threats including ransomware, phishing, and abuse of your personal data by big tech.

01
IT ALL STARTS WITH BEING AWARE OF THE CYBERSECURITY AND PRIVACY THREATS YOU FACE

Over the course of 4-weeks, I will provide you with helpful tips and instructions on how to transform the current state of your cybersecurity and privacy. But it first begins by understanding the threats you may face. You may think, why would someone target me for my information? I’m not a celebrity. I’m just an “average joe”. The truth is, anyone can be a victim of a data breach, ransomware attack, or be socially engineered to give away valuable information about our private lives. This program will make you less of a target and more prepared to identify cyber-attacks and threats to your privacy. 

Each week a new challenge will educate you, provide a helpful tool or walkthrough, and a task to complete. You will be challenged to take a new action every week that will improve your cybersecurity and privacy posture. As your guide, I'll be with you every step of the way.

02
WHAT TO EXPECT

Each week you will get an email from me on one important cybersecurity or privacy topic to learn more about and understand

I’ll offer you a short challenge with tools, walk-throughs and instructions to complete

Afterwards, you’ll discover you’ve significantly improved your cybersecurity and privacy

03
HERE’S WHAT YOU NEED

A laptop / desktop computer or smartphone

An open mind about current cyber-threats and how you could be a victim

The willingness to improve your cybersecurity and privacy

The BENEFITS

multiple laptops phones and tech on table
Increased Awareness

Becoming more cyber-aware starts with education. We don’t know what we don’t know and because of the wide range of threats targeted at all of us every day, it’s hard to keep up! Through this program you’ll learn about the most current threats that could affect you and the technology that you use every day.

instagram facebook twitter using social media on smartphone iphone
Use social media while keeping your privacy in mind.

We use social media every day to keep in touch with friends and family and it has become integrated in the way we live our lives. To just delete our social media accounts forever is a daunting task. But there is a compromise.

We can still use social media in a responsible way keeping our privacy in mind. Sure, you do give up some privacy when using any social network but with the right knowledge, you can accept a certain level of risk with the privacy controls that are built into the social media apps that we use.

make your web presence private with iphone lock airpods and plant
You’ll take a proactive approach to safeguard your online accounts.

Twitter recently reported thatonly 2.3% of its user base enabled two-factor authentication. While this might seem shocking, many people don’t know that two-factor authentication is the one of the best things you can do to protect your online accounts from being hacked! Multi-factor authentication is even more important than choosing good passwords in most cases. With this course, you’ll learn more things than the average person does by putting you in the category of someone who can take their account security to the next level! 

From those Who did it

I feel more confident now using my social media accounts and browsing the web without fear.

I didn't realize how at risk I was! Thank you to Tom and the SLNT team for putting this easy guide together.

Do you worry when you hear about all of these information leaks and companies being hacked? This easy program gave me back my Peace of Mind.

I sent this to all my friends and family after I was done. They lay it out simply for anyone to follow.

ABOUT YOUR GUIDE

Tom Eston has been a cybersecurity and privacy professional for over 17 years. He currently manages a consulting practice for the largest offensive security firm in the United States and is the founder and host of the Shared Security Show which is a weekly podcast focused on bringing you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

Links to follow Tom Eston and the Shared Security Show: YouTube / IG / Twitter

tom eston shared security
After you enroll in the Program you’ll receive an email with next steps

JOIN THE SLNT® PHONE DETOX PROGRAM

Sign Up Now