Page 1 of 3
Get Started Form
Thank you for your interest in Heatena Consulting! Please complete this quick Get Started Form so we can assess your needs and see if we’re the right fit for you. This should take less than 5 minutes.
Step 1: Contact Details
Full Name
*
Email Address
*
Phone Number
Company Name (If Applicable)
Location (City, State/Region, and Country)
*
Preferred Method of Communication
Let us know how you'd like to receive updates throughout your experience.
We’ll only reach out when needed — no spam, just smooth progress.
*
Preferred Method of Communication Let us know how you'd like to receive updates throughout your experience. We’ll only reach out when needed — no spam, just smooth progress.
A
Text Message (SMS)
B
Email
C
Both
Share a valid social media profile link, to help us verify your identity.
*
Accepted formats:
✅ LinkedIn:
linkedin.com/in/yourname
✅ Twitter/X:
x.com/yourhandle
✅ Instagram:
instagram.com/yourhandle
✅ Facebook:
facebook.com/yourname
Step 2: Basic Background
What’s Your Main Security Concern?
*
How Did You Hear About Us?
*
Annual Income
We use this information to ensure our services align with clients who benefit the most from our high-net-worth-focused cybersecurity solutions.
*
Net Worth
Estimate your current net worth to help us determine the level of protection and services that best match your profile.
*
Step 3: Security Concerns & Goals
What are your primary cybersecurity concerns?
Choose any of the options that apply
*
What are your primary cybersecurity concerns?Choose any of the options that apply
Data breaches
Identity theft
Securing business assets
Protecting smart devices/home networks
Compliance with industry regulations
Do you currently have cybersecurity measures in place?
*
Do you currently have cybersecurity measures in place?
A
YES
B
NO
What types of devices or systems do you need secured?
Choose any of the options that apply
*
What types of devices or systems do you need secured?Choose any of the options that apply
Computers (Windows, Mac, Linux)
Servers (Windows, Linux)
Networking Devices (e.g., Routers, Firewalls)
Smart Home Devices (e.g., IoT devices)
Mobile Devices (iPhone, Android)
Web Applications
What type of service are you looking for?
*
What type of service are you looking for?
A
Personal cybersecurity
B
Microbusiness security
Do you have an in-house IT team or external support?
*
Do you have an in-house IT team or external support?
A
YES
B
NO
Step 4: Current Setup
How urgent are your cybersecurity needs?
This helps us gauge the severity of your concerns, but please note that response times are based on availability and not the urgency selected.
What made you seek cybersecurity consulting at this time?
*
How do you usually handle your sensitive information?
*
Step 5: Lifestyle & Risk Profile
Do you travel frequently, work remotely, or both?
Do you travel frequently, work remotely, or both?
A
Travel Frequently
B
Work Remotely
C
Both
Which digital assets are most valuable to you?
*
How confident are you in handling everyday technology tasks?
Rate your comfort level on a scale of 1 to 5:
*
How confident are you in handling everyday technology tasks? Rate your comfort level on a scale of 1 to 5:
A
1 – Not Confident: "I need help for most tech-related tasks."
B
2 – A Little Confident: "I can manage some tasks but need help with new or unfamiliar technology."
C
3 – Fairly Confident: "I’m okay with most basic tasks and only need help occasionally."
D
4 – Very Confident: "I handle most tech tasks with ease."
E
5 – Extremely Confident: "I’m very comfortable with technology and rarely need assistance."
What home automation or smart devices do you use regularly?
Step 6: Final Thoughts
What would be the worst-case scenario for you in terms of a cybersecurity breach?
What type of information or devices do you feel are most vulnerable in your digital life?
*
How concerned are you about potential future threats to your digital assets?
On a scale of 1 to 5, how concerned are you about future security risks?
*
How concerned are you about potential future threats to your digital assets? On a scale of 1 to 5, how concerned are you about future security risks?
0
1
2
3
4
5
How important is maintaining anonymity in your online presence?
Rate the importance of online anonymity from 1 (Not Important) to 5 (Very Important)
How important is maintaining anonymity in your online presence? Rate the importance of online anonymity from 1 (Not Important) to 5 (Very Important)
0
1
2
3
4
5
Have you experienced any recent privacy concerns or breaches?
Next
Never submit passwords through Tally forms.
Report malicious form