Too few voices in the truth seeker and dissident communities understand the very real risks to their data and existence posed by cyber security threats. Chief among these is still catastrophic data loss, an eventuality that’s preventable through solid data backup strategies. However, ransomware, data theft, and government sponsored spyware like the israeli “Pegasus” have also been the bane of many individuals and organizations, as have vindictive ex-employees and former associates.
Your Problem
- Individuals and small organizations are most vulnerable to cyber attacks¹
- Breaches are up 10% year on year²
- 58% of all organizations have 100,000+ files without restricted user access³
- 41% of companies allow staff open access to sensitive files³
- 92% of Malware is delivered by Email⁴
- How can you be sure your Cyber Security Measures are effective?
Our Solution
BTF’s Cyber Security Health Check tests your organization’s human and electronic defenses, to detect weaknesses and find gaps, and ensuring they’re fit for their intended purpose of keeping your data and information secure.
Focusing on both the technological and the human level, we test against intrusion by malicious software, as well as phishing and social engineering attacks.
Request a Call-Back
Cyber Security Risk is Business Risk

Over the years our team members have dealt with the aftermath of countless business outages, with causes ranging from catastrophic hardware failure to interruptions caused by natural disasters like Hurricane Harvey, and even sabotage by disgruntled employees.
State-Sponsored Hacking and Malware
More recently we’ve seen an increase in intrusions and data breaches by what we suspect are state-sponsored bad actors, against dissident voices in the citizen/independent journalism and alternative media sphere. The pattern here has been a slew of attacks against voices critical of israel’s genocidal behavior against Palestinians, as well as those publicly calling out the World Economic Forum’s (WEF) globalist agendas.
In most cases these disasters and attacks could have been avoided or mitigated by greater preparedness, tighter security, and strong data backup regimes.
Don’t set yourself up for the Perfect Storm.
- Are all devices and software configured properly?
- Are new security measures and solutions doing their job?
- Are there gaps or weaknesses in your defenses?
- Are your staff/members prepared for phishing and social engineering attacks?
- Are you vulnerable against sabotage by hostile ex-employees or bad actors?

That’s where we help…
We answer these questions and ensure that you understand how any threats and weaknesses in your cyber defenses equate to concrete threats against you and your organization, and its sensitive information.
Request a Call-Back
Sources:
- ¹ Embroker
- ² Cobalt
- ³ like Social Security Numbers, Health Records, etc. – Netskope 2025 Threat Report
- ⁴ Balbix