Zeltar Consulting
Overview of Services

Overview of Services

The advice offered through the blog entries is free.  There are no trackers used on this website, so there is no revenue generated here from your visit.

While reading and associated videos are educational, some people may find they need a helping hand with implementation.  It’s easy for technology people to assume others are keeping up.  But everyone has their niche where they’ve spent time and have grown to be somewhat of a subject matter expert.  And, for most, that niche does not fall into the security space of Information Technology.

Services for hire might include:

Presentations:  Virtual or On-Site visit to Company, Senior Center, School, or community center, I can present methods to keep you safe while using the Internet on your personal devices.  This is meant to be interactive, so real life situations can be discussed.

Password Management: Create and maintain strong, complex, and unique passwords across all websites you use without having to remember and type those passwords yourself while also sharing with select family members specified household website accounts (e.g. Utilities, Streaming Services).

Email Segregation: Get your emails under control. Provide custom, unique or category specific, email addresses fit for purpsoe and view them with a single hidden email account. Automate filtering to route emails to folders, auto apply expiration dates (e.g. for marketing emails), get notified only of the emails you want, and remove the ability for a sold email address to send you spam in perpetuity.

Device physcial and logcal seperation: Setup your Local Area Network (WiFi and/or Ethernet) to segment network traffic, creating a barrior where less secure devices (e.g., Internet of Things (IOT)) cannot be used to infiltrate more critical devices (Computer, Cell Phone).

Whole Network Protection: Design your home network (WiFi and/or Ethernet) to protect all the devices with automated multiple updates per day at the router, including advanced protections like Web Filtering, Virus Blockers, Threat Prevention, Intrusion Prevention, and an advanced Firewall. If Intenet stability is a concern, also add a failover internet service provider and/or load balance between two Internet Service Providers.

Implement a backup strategy:  Establish a backup methodology that will protect all your devices, using automated scheduled backups and advanced retention policies to a local NAS device.  Implement read-only snapshots and related retention policies as defense against ransomware.  And configure offsite NAS backups to the cloud.