Skip to content

The Original

Cyber Security House Call

On‑site, professional cybersecurity for your home - delivered in person by experienced security engineers.

 
Founded 2012 · Fully Insured · Marietta, GA

Choose the Level of Protection That’s Right for You

Start with a professional in‑home visit, then go deeper if needed.

Standard House Call

  • One‑time, in‑home cybersecurity assessment and hardening
  • Ideal for individuals and families

Complete Security

  • Expanded protection for higher‑risk digital environments
  • Ideal for executives, professionals, and targeted individuals

Ongoing Protection

  • Continuous security after your house call
  • Ideal for long‑term peace of mind
Thomas Stone

Tom Stone

Managing Partner & Founder

Two decades of security experience with Fortune 500 companies and critical infrastructure. Microsoft and Check Point certified. Now bringing institutional-grade cybersecurity to individuals and families who need protection from sophisticated threats.

Tom received a BA from Boston University and a MBA from Georgia State University.  He is an active member of Infragard-Atlanta.   

Frequently asked questions

What is a Cyber Security House Call?

A Cyber Security House Call is our signature on-site service where a qualified security expert comes to your home or office. In up to 2 hours we assess your devices, scan for viruses and malware, set up multi-factor authentication (MFA), improve spam/scam blocking, and give you practical guidance using enterprise-grade tools — all in person with white-glove service.

Do you scan for viruses and malware on-site?

Yes. We use professional tools (including the Malwarebytes Toolset) to thoroughly scan your computers, phones, and tablets for viruses, malware, spyware, and other threats. We remediate (quarantine and remove) what is practical during the visit and explain the results clearly.

How long does a House Call take?

Most visits last up to 2 hours. This is a focused, one-time consultation — not ongoing remote support.

How much does a Cyber Security House Call cost?

$250 (payable upon completion). The fee is non-refundable once the service begins.

What exactly do you do during the visit?

We follow our Cyber Security House Call Checklist, which includes:

  • Hardware security assessment
  • Full malware/virus scan and remediation where possible
  • MFA setup on devices, email, and telecom accounts
  • Enhanced spam and scam blocking configuration
  • Guidance on the National Do Not Call Registry and safe practices

You will receive a signed copy of the checklist at the end of the visit.

Do I need to prepare anything before you arrive?

Yes — please back up important files beforehand, make sure we can safely access your devices and location, and have passwords or account access ready (we never store them). Full cooperation helps us deliver the best results.

Is there any guarantee that all threats will be removed?

Like all cybersecurity services, we provide the work “AS IS” with no warranties. We use best-in-class tools and follow proven processes, but no one can guarantee 100% protection against every possible threat. Our total liability is limited to the fee paid for the consultation (per our Service Agreement).

Do you offer ongoing protection after the House Call?

Yes. Many clients add our monthly plans afterward:

  • Device Security – $25/month
  • Home Firewall – $85/month
  • File Backup – $25/month per 250 GB

We can discuss these during or after your House Call.

Are you insured for this work?

Yes. TargetProof, LLC carries Professional Liability (Errors & Omissions), General Liability, and Cyber insurance through Hiscox. We are fully covered for the consulting and on-site services we provide.

What area do you serve?

We primarily serve the greater Marietta and Atlanta metro area (Cobb County and surrounding). Contact us to confirm your location.

Do I have to sign an agreement?

Yes. Every client reviews and signs (or electronically agrees to) our Security Consultation Service Agreement and House Call Checklist before work begins. It clearly outlines scope, responsibilities, third-party software terms (e.g., Malwarebytes), and limitation of liability.