Our Program

Cybersecurity incidents are becoming increasingly common. They can leave people and organisations devastated. Based on decades of trusted research, we know that everyone has unique combinations of cybersecurity vulnerabilities. Our models allow you to uncover your unique vulnerabilities and stay safer online.

Take the assessment

What is a DType?

A DType is a snapshot of how you behave online. It is based on the information in the assessment you complete.

Every DType is made up of a variety of elements. These are Orchestrator, Communicator, Explorer, Supporter and Creator. Everyone has one element that is dominant - your Primary DType.

We use your DType to identify your vulnerabilities.

About Digital Type

What is a Safety Score?

Once we have identified your vulnerabilities, our intelligent models prioritise them and make recommendations unique to you. For example, if we identify you are vulnerable to poor password hygiene you may want to use a password manager and MFA. The models that calculate your Safety Score continually improve to make more accurate assessments.

See how Amy and Bobby’s vulnerabilities differ

Amy

About Amy

Amy is a software product manager at a large tech firm. She leads a team of 20 professionals and is critical in enhancing her firm’s products. Amy is a tech-savvy professional who uses tools like Trello for project planning, Google Meet for communication, and document collaboration tools. She uses her technical and people skills to drive innovation and is methodical and friendly. Amy can never keep a secret.

Amy’s top vulnerability

Not using secure communication channels

MODERATE
Bobby

About Bobby

Bobby is a Junior Sales Associate at a solar panel manufacturer. He's sharp and dedicated but can occasionally be careless. He balances his digital-heavy workweek by disconnecting from technology at the weekend. For Bobby, digital tools are a means to an end. He efficiently finds and connects with new prospects on LinkedIn and uses email to communicate with them.

Bobby’s top vulnerability

Incorrect storage of data and devices

CRITICAL

Find out your digital strengths and weaknesses