
Local Digital Security
for Small Businesses.
You run the business. I’ll help protect it.
Most small businesses skip security until it’s too late. I help lock things down—no jargon, no pressure, just one on-site checkup.
On-site security setup.
$300—flat
I’ll come to your office and:
✔ Secure your devices, accounts, and network
✔ Lock down passwords, enable 2FA, check for malware
✔ Walk you through what’s fixed and how to stay safer
✔ No upsells, no subscriptions—just one visit, done right
Don’t wait for a breach or fine.
If you’re sharing logins, using old devices, or don’t know who’s on your network—you’re exposed. I’ll help fix that before it becomes a problem.
Local, human, and here to help.

I’m James—based in Nampa and serving Boise, Meridian, and nearby areas.
Ready to feel secure?
Call or text James: 1 (208) 872-5132
Email: [email protected]
Prefer to message first? Use the form below.
I accept cash or check—no credit cards just yet.
Based in Nampa. Serving Boise, Meridian, Caldwell, and nearby areas.
© Boise Privacy. All rights reserved.
Thanks—your message is in good hands.
I personally read and respond to every message—usually within one to two business days. No bots. No spam. No mailing list.Looking forward to helping,
—James

James Grey
IT Specialist.
Field notes from my cybersecurity journey.
Hi, I'm James.
Certifications.
Skills.
Locked in
Built and optimized custom gaming PCs and home lab environments for over 15 years
Strong working knowledge of networking, router configuration, and system performance tuning
Expert-level proficiency with Windows and macOS; experienced Linux user (Kali, Arch, Ubuntu, Mint)
Front-end development experience with GIT, HTML\CSS, JavaScript, and PHP; familiar with Apache, hosting, and deployment workflows
Solid foundation in operational security and personal privacy best practices
In training
Security Event Triage: Log monitoring, alert investigation, and Tier 1 escalation workflows (lab-based)
SIEM Familiarity: Splunk, ELK Stack, Wazuh (hands-on use in simulated SOC environments)
Network Traffic Analysis: Wireshark, Zeek, TShark, NetworkMiner (packet capture & protocol tracing)
Endpoint Visibility: Sysinternals, Sysmon, Velociraptor, KAPE (intro forensic tooling exposure)
Threat Frameworks: MITRE ATT&CK, Cyber Kill Chain, Diamond Model (applied in training scenarios)
Recently Completed Rooms

08 / 01 / 2025
Active Directory Basics

07 / 27 / 2025
Network Fundamentals

07 / 20 / 2025
Linux Fundamentals

07 / 19 / 2025
Windows Fundamentals
Labs.
SYN Scan Detection
Tools:
Summary: