Local Digital Security
for Small Businesses.

You run the business. I’ll help protect it.
Most small businesses skip security until it’s too late. I help lock things down—no jargon, no pressure, just one on-site checkup.

On-site security setup.

$300—flat

I’ll come to your office and:

Secure your devices, accounts, and network
Lock down passwords, enable 2FA, check for malware
Walk you through what’s fixed and how to stay safer
No upsells, no subscriptions—just one visit, done right

Don’t wait for a breach or fine.

If you’re sharing logins, using old devices, or don’t know who’s on your network—you’re exposed. I’ll help fix that before it becomes a problem.

Local, human, and here to help.

I’m James—based in Nampa and serving Boise, Meridian, and nearby areas.

Ready to feel secure?

Call or text James: 1 (208) 872-5132
Email: [email protected]

Prefer to message first? Use the form below.

I accept cash or check—no credit cards just yet.

Based in Nampa. Serving Boise, Meridian, Caldwell, and nearby areas.
© Boise Privacy. All rights reserved.

Thanks—your message is in good hands.

I personally read and respond to every message—usually within one to two business days. No bots. No spam. No mailing list.Looking forward to helping,
—James

James Grey

IT Specialist.

Field notes from my cybersecurity journey.


Hi, I'm James.

I'm pivoting into cybersecurity after years in design and front-end development.This site documents my hands-on training, technical experiments, and evolving skillset as I work toward a professional security role.

TryHackMe profile page:


Certifications.

Pre Security
August 1, 2025


Skills.

Locked in

  • Built and optimized custom gaming PCs and home lab environments for over 15 years

  • Strong working knowledge of networking, router configuration, and system performance tuning

  • Expert-level proficiency with Windows and macOS; experienced Linux user (Kali, Arch, Ubuntu, Mint)

  • Front-end development experience with GIT, HTML\CSS, JavaScript, and PHP; familiar with Apache, hosting, and deployment workflows

  • Solid foundation in operational security and personal privacy best practices

In training

  • Security Event Triage: Log monitoring, alert investigation, and Tier 1 escalation workflows (lab-based)

  • SIEM Familiarity: Splunk, ELK Stack, Wazuh (hands-on use in simulated SOC environments)

  • Network Traffic Analysis: Wireshark, Zeek, TShark, NetworkMiner (packet capture & protocol tracing)

  • Endpoint Visibility: Sysinternals, Sysmon, Velociraptor, KAPE (intro forensic tooling exposure)

  • Threat Frameworks: MITRE ATT&CK, Cyber Kill Chain, Diamond Model (applied in training scenarios)

Recently Completed Rooms

08 / 01 / 2025

Active Directory Basics

07 / 27 / 2025

Network Fundamentals

07 / 20 / 2025

Linux Fundamentals

07 / 19 / 2025

Windows Fundamentals


Labs.

SYN Scan Detection

Tools:
Summary: