Cyber Value Systems

Does the pervasive use of technology in your home worry you?  Are your children more technically savvy than you?  Do you struggle to grasp what rules you should apply to your family’s use of computers, mobile devices, apps, gaming, streaming, etc., because you don’t simply don’t understand the technology?  Does this ambiguity add to your daily stress and foster undo contention between you and your children?  It’s time for you to take ownership of Cyber Technology use in your life and Cyber Value Systems is here to help!

Protecting What's Important


At Cyber Value Systems, our mission is to help adults map their own course through this complex, unrelenting cyber-technology renaissance.  But you are key! 

We will help you to become more informed and create a personal Cyber Value System governing the acceptable use of technology in your own life and the lives of your loved ones.

  • Parental Control

    Have you tried parental control solutions promising to alleviate all of your concerns, only to find they are not intuitive and only create more stress in your life and your relationship with your children?

    Informed Guidance

    Do you wonder if the cyber technology decisions your children make are wise but you don’t know enough about the technology to provide adequate guidance?


    Are you overwhelmed with the technology choices that are required of you as parents?

Educational Seminars

Cyber Value Systems offers educational seminars that empower individuals to confidently make wise decisions for themselves, which in turn impact their family and society.  We tailor our seminars to meet your specific needs.

Learn More
Technology Management

Cyber Value Systems is developing a comprehensive system of software and hardware solutions designed to empower individuals in their goal of achieving net-positive technology integration in their lives and community.

Learn More

“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.”

Bruce Schneier

Protect Your Macintosh, 1994

“Any technological advance can be dangerous. Fire was dangerous from the start, and so (even more so) was speech - and both are still dangerous to this day - but human beings would not be human without them.”

Isaac Asimov

American Writer and Professor

“We shape our buildings and afterwards our buildings shape us.”

Winston Churchill

Prime Minister of the United Kingdom, 1940 - 1945, 1951 - 1955

“Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.”

James Scott

Sr. Fellow, Institute for Critical Infrastructure Technology

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”

Kevin Mitnick

“The Worlds Most Famous Hacker”

“Attention is a resource—a person has only so much of it.”

Matthew Crawford

Contact Us

Ready to start the conversation to establish your value system?

P: +1 (416) 433 5646

Contact Us