Page 1 of 3

Get Started Form

Thank you for your interest in Heatena Consulting! Please complete this quick Get Started Form so we can assess your needs and see if we’re the right fit for you. This should take less than 5 minutes.

Step 1: Contact Details

Full Name

Email Address

Phone Number

Company Name (If Applicable)

Location (City, State/Region, and Country)

Preferred Method of Communication Let us know how you'd like to receive updates throughout your experience. We’ll only reach out when needed — no spam, just smooth progress.

Preferred Method of Communication Let us know how you'd like to receive updates throughout your experience. We’ll only reach out when needed — no spam, just smooth progress.
A
B
C

Share a valid social media profile link, to help us verify your identity.

Accepted formats: ✅ LinkedIn: linkedin.com/in/yourname ✅ Twitter/X: x.com/yourhandle ✅ Instagram: instagram.com/yourhandle ✅ Facebook: facebook.com/yourname

Step 2: Basic Background

What’s Your Main Security Concern?

How Did You Hear About Us?

Annual Income
We use this information to ensure our services align with clients who benefit the most from our high-net-worth-focused cybersecurity solutions.

Net Worth Estimate your current net worth to help us determine the level of protection and services that best match your profile.

Step 3: Security Concerns & Goals

What are your primary cybersecurity concerns?
Choose any of the options that apply

What are your primary cybersecurity concerns?Choose any of the options that apply

Do you currently have cybersecurity measures in place?

Do you currently have cybersecurity measures in place?
A
B

What types of devices or systems do you need secured?
Choose any of the options that apply

What types of devices or systems do you need secured?Choose any of the options that apply

What type of service are you looking for?

What type of service are you looking for?
A
B

Do you have an in-house IT team or external support?

Do you have an in-house IT team or external support?
A
B

Step 4: Current Setup

How urgent are your cybersecurity needs?
This helps us gauge the severity of your concerns, but please note that response times are based on availability and not the urgency selected.

What made you seek cybersecurity consulting at this time?

How do you usually handle your sensitive information?

Step 5: Lifestyle & Risk Profile

Do you travel frequently, work remotely, or both?

Do you travel frequently, work remotely, or both?
A
B
C

Which digital assets are most valuable to you?

How confident are you in handling everyday technology tasks?
Rate your comfort level on a scale of 1 to 5:

How confident are you in handling everyday technology tasks? Rate your comfort level on a scale of 1 to 5:
A
B
C
D
E

What home automation or smart devices do you use regularly?

Step 6: Final Thoughts

What would be the worst-case scenario for you in terms of a cybersecurity breach?

What type of information or devices do you feel are most vulnerable in your digital life?

How concerned are you about potential future threats to your digital assets?
On a scale of 1 to 5, how concerned are you about future security risks?

How concerned are you about potential future threats to your digital assets? On a scale of 1 to 5, how concerned are you about future security risks?

How important is maintaining anonymity in your online presence?
Rate the importance of online anonymity from 1 (Not Important) to 5 (Very Important)

How important is maintaining anonymity in your online presence? Rate the importance of online anonymity from 1 (Not Important) to 5 (Very Important)

Have you experienced any recent privacy concerns or breaches?

Never submit passwords through Tally forms.
Report malicious form