28% of high-net-worth individuals have been the victim of at least one cyber attack

Forbes

If you have a profile, you have a problem.

coc00n provides cyber security services to high value, high risk individuals at a level previously only available to those under government protection

coc00n is designed and operated by former GCHQ and NCSC cyber security experts

Logo of the National Cyber Security Centre for Startups Alumni, featuring a crown and shield design with text.

Our Services

A man in a beige coat walking with a suitcase and holding a laptop in an urban area during sunset or sunrise.

For Individuals

As a high value individual your information is at risk from cyber criminals and prying eyes. Our mobile device protection service is designed for high value individuals and their families at a level previously only available to those under government protection. 

With coc00n Device Protection, your devices are secured against compromise. Combined with our Cyber Concierge service, coc00n delivers proactive, unrivalled cyber security with absolute discretion and privacy. 

Silhouettes of people standing and talking in a conference room with sunlight streaming through large windows, reflections on a glossy table with notebooks, a tablet, glasses, and pens.

For Organisations

High-value organisations are constantly under threat from cyber criminals due to the sensitivity of the information they hold or their financial value. coc00n protects organisations against cyber-attack.  

Clients receive a bespoke service, designed to assess, prepare, transform, monitor and respond, securing the organisation across their entire digital estate. 

coc00n Device Protection

Our unique mobile device protection secures phones, tablets and laptops against cyber attacks without restricting usability.

Devised and managed by former GCHQ experts, coc00n offers an unrivalled suite of proactive device protections that secures the device itself and all the data within it.

“As the physical world and cyberspace have converged via smart phones; mobile malware, proximity attacks and application attacks are allowing for cybercriminals and spies to manifest in both your digital and physical life. From stealing your money; to turning on the microphone and camera specific to your location, to using your mobile device to compromise your work network, cybercrime cartels have gone wireless. Security and safety are dependent on mobile security.”

Tom Kellermann, Global Fellow for Cyber Policy at the Wilson Center

Logo of the Wilson Center with a stylized blue 'W' and gray text.

Our Clients

A photographer takes a picture of a person with curly hair and a hat, who is facing away from the camera, in an indoor setting.

High Profile

A global star with an exceptionally high public profile.

Highly concerned about device security, and the possibility that they may have been compromised, risking the exposure of highly sensitive and commercially valuable data, our client chose to enhance their personal mobile devices with coc00n.

A black wrought iron gate opens to a pathway covered with fallen autumn leaves, leading to a white residential building surrounded by trees with yellow and green leaves.

High Risk

Our client is a boutique firm specialising in threat intelligence and dealing with highly sensitive, commercially valuable information of a nature likely to attract able adversaries.

Concerned about the suitability and resilience of their internal systems and processes, we were appointed to review their entire digital estate and produce a comprehensive risk analysis report and transformation strategy.

Looking up at tall modern skyscrapers in a city.

High Value

UK Listed Company with a multi-billion-pound valuation.

The client was concerned about internal risk and data leaks and required analysis of existing systems and data to establish the facts and cauterize the risk.

High Interest = High Risk

A person sitting at a desk with a laptop, wearing headphones, in a home office setting.

Exposed: the global hacking network that targets VIPs

A 2022 investigation by The Times and the Bureau of Investigative Journalism exposed a VIP hacking network targeting high profile and high-net-worth individuals on a prolific scale


The logo of The New York Times in blackletter font.

How Jeff Bezos’ iPhone X was hacked

The mobile phone of Amazon Founder Jeff Bezos was hacked via an attachment sent in a WhatsApp message. His personal data was harvested for weeks before it was discovered.


Three black squares with white letters: B, B, and C.

Liz Truss phone hack claim prompts calls for investigation

The personal mobile phone of then Foreign Minister Liz Truss was infiltrated in a suspected Russian state-sponsored attack