Anyone who is concerned about their privacy and security, or the privacy and security of their family members. Particularly, if you use public wifi, travel frequently, engage in online forums or social media or online transactions (shopping, banking, etc.). Rubica also specializes in protecting from crypto-specific threats and securing blockchain environments.
Who needs Rubica?
Who is Rubica Private Client for?
Our customers seek the highest level of digital security because they are generally at greater risk for cybercrime than the average person. Often they are public figures (e.g., C-suite or board member of a well-known company, or in media, sports or politics), have greater-than-average financial assets (making them a prime target for financial cybercrime), or are involved in frequent online transactions, like active investing.
How many users should I include in my account?
We recommend covering all people and devices who have access to your personal information or your network. This could be your immediate family or extended family members (e.g., parents, adult children, siblings) and often also includes a personal assistant or business manager. Many customers chose to protect key members of their professional staff such as an accountant or bookkeeper. Rubica is also frequently used by groups of professionals, such as the partners in a law firm, an entire board of directors, or key groups of executives in a company.
Is Rubica hard to setup?
Not at all – it takes just three steps:
- Sign yourself up online (~3 minutes) or contact sales for a custom quote.
- You and your other users will be emailed a login and a link to download the app on all of your devices. (~3 minutes per device)
- You’re done. Our cyber experts will immediately begin keeping you safe.
If you have any questions during set up, we are always available to help.
How much does Rubica cost?
Rubica offers multiple subscription tiers so you can find a price and package that fits your needs. Please visit our homepage to learn more. You can also contact us for a custom quote for groups of users and devices. We want to make sure you love our service, so no strings attached.
Which devices should I setup with Rubica?
We strongly recommend installing Rubica on all the primary devices that you use for communication and the internet. This typically includes your smartphone (Apple or Android), computer (Mac or Windows) and tablet (Apple or Android). This allows us to comprehensively protect you, regardless of which device you are using.
What about my smart home (IOT) devices?
Currently, Rubica does not support home devices such as Nest, Echo (Alexa), webcams, etc. While we strongly advise you to secure these, your personal devices (i.e., phone, laptop, tablet) are still the most common targets for criminals. As a Rubica Private Client, you have access to our cyber experts for a free consultation on any cybersecurity issues – including specific advice on how to secure your IoT devices.
How do I install Rubica?
Please see our Installation page for detailed instructions, or contact us with any questions.
What platform does the Rubica app support?
See the installation page for more details.
How is Rubica different from other solutions?
The Rubica app that runs on your smartphone, tablet or computer creates a Virtual Private Network (VPN) between your device and the internet content you access. The purpose of the VPN is to securely route your device traffic through our secure, private internet environment, where we can protect your internet web-browsing from third-party snooping and block/detect threats lurking on the open web (e.g., malware or a virus hidden on a website you visit). There are many VPNs on the market today, but the Rubica VPN has several unique features:
- The Rubica VPN includes automatic threat blocking mechanisms and is monitored by our staff of cybersecurity experts who work behind the scenes to make sure your data traffic is safe. Other VPNs are static, unmonitored tunnels and do not include any threat-blocking capabilities.
- Because the Rubica VPN is designed for a personal user (not a corporation), we will not block normal safe activity – which means no restrictions on what you can access and no interference with your services, unless that service itself disallows VPNs.
- Our team of cybersecurity experts use the most advanced tools in threat detection and customized behavioral analytics to monitor the data traffic to/from your devices.
Does Rubica run all the time and can I turn it off?
Rubica runs 24/7, but you can turn it off with a simple button on the main screen of the app. Pressing this button will allow you to temporarily disconnect your device from Rubica’s secure, private network. This may be necessary, for example, if you need to connect to a corporate VPN for work or when accessing a service that does not allow VPN traffic. Since Rubica needs to be turned on in order for us to keep you secure, the Rubica app will use push notifications to periodically remind you to re-connect if you have been disconnected for a while.
Can I use Rubica anywhere in the world?
Yes. Rubica will keep you secure on any internet connection, wifi or cellular, regardless of your location.
What if I forget my password?
You can recover your password by clicking “forgot my password” on the login screen.
Will Rubica slow down my internet?
Sorry, yes – but only slightly. We need to monitor your data connection to keep you safe and this slightly decreases your speed. However, as a personal security company, we’ve worked hard to ensure this will have little impact on your life. We do this in two ways: 1) We use a technical feature called “split tunneling,” which means we let certain traffic (which is very bandwidth intensive but also known to be safe) go around our VPN. 2) We have enough capacity so that any slowdowns in normal web browsing and app usage on any 4G or even 3G connection will be virtually unnoticeable.
Whose devices can I view in the Rubica application?
You can view your own devices and the devices of other users in the same account whom you’ve personally invited to join. Invitations to other users can be sent through the my.rubica.com website. For another user’s name to appear in the “Devices” tab of the Rubica iOS app, that user must download the Rubica app on at least one device.
How do I remove devices from my account?
You can remove devices in the Rubica iOS app. Swipe left on the device name in the “Devices” tab, then tap the red delete button that appears. Once removed, the device must be re-registered through the Rubica app in order to connect to the Rubica service.
You can’t remove the current device you’re using, which appears at the top of the list. You also can’t remove devices that are registered to another person.
How do I add people to my account?
To add a person, log in to the my.rubica.com website and navigate to the “Users and Devices” page. From there, you can invite people by typing their name and email address. Invited people will receive an email with a link for creating their password. Please note that multi-factor authentication needs to be enabled to add people.
How do I remove people from my account?
To remove a person, log in to the my.rubica.com website and navigate to the “Users and Devices” page. From there, tap the Delete button next to their name in the User List at the bottom of the page. Please note that multi-factor authentication needs to be enabled to add people.
Can I increase the number of people or devices that can be added to my account?
What data about my security is shown in the Rubica app?
We currently provide three pieces of data about your security in our app.
- Protection Status indicates whether or not your device is connected to the Rubica VPN and our secure threat-prevention network.
- Threats Blocked describe known malicious threats that have been blocked by Rubica.
- Threats Under Investigation describe suspicious activity, events, patterns and behavior that have been detected and are under investigation by Rubica analysts.
More details about this can be seen on the CyberSecurity Science page.
For Rubica Private Clients: What types of security alerts would your experts contact me about?
As we protect you behind the scenes, the Rubica iOS app will list any threats blocked or under investigation. You can also opt-in to receive push notifications when a threat is blocked. For example, we routinely block malware, which often hides in innocuous-looking ads in the margins of legitimate websites and online articles. When an emerging threat that is not automatically blocked is found by one of our cyber analysts, a member of our concierge team will personally reach out to you via email or phone call. They can explain to you what the threat is and help you remove the threat from your device or give you advice on how to mitigate the threat. An example of when we would alert you is if you enter your login username and password on a fraudulent “look-alike” site (e.g., a site that looks like your bank but isn’t) and unknowingly expose your login credentials to criminals. If we see this, a concierge team member will email you and provide specific recommendations. This could include changing your password on that site and any others where you may use it, enabling additional security like two-factor authentication (we will explain this if you aren’t familiar), giving instructions for how to see if anyone illegitimate has logged into your accounts, etc.
Is everyone on my Rubica account notified of a threat, or just me, as the primary account holder?
Each individual user is notified about threats related to his/her own devices. For example, we would tell you about any threats that require action on any of your devices, and tell your spouse about any threats that require action on any of his/her devices. The Rubica app lists Threats Blocked and Threats Under Investigation for your own devices. You can choose to allow the Rubica app to alert you with a push notification when a known malicious threat has been blocked.
Does Rubica protect my privacy?
Yes. Rubica uses encrypted Virtual Private Network (VPN) technology to keep your data fully private when using shared networks like public wifi. Rubica also blocks your home and mobile internet provider from seeing your traffic so they are unable to collect and sell your browsing or app usage data.
We do not report or control your internet usage. We are not a content filtering, parental controls or advertising company. We are strictly a security company and only serve to ensure your information is safe. We will never tell you about the web browsing or internet usage information for another member of your Rubica account or vice versa. Rubica will prevent your children from downloading most malicious files but will not report on your child’s internet usage.
How can I trust Rubica?
Rubica is not an unknown startup. We were spun out of Concentric Advisors, a decade-old physical security company that protects some of the highest profile targets in the world. Keeping information secure is in our DNA. We follow the leading standard on this, which is to segment everything and limit access to information on a “need to know” basis, even within our own staff.
What data does the Rubica App monitor and collect?
We are only looking at the traffic flowing to and from your devices and the events that take place via those web connections on a metadata level. We do not access your files, documents, or emails. We also do not look at the content of the videos you stream or content on the sites you visit. To articulate this in an analogy: Imagine that we are the post office, and in the process of delivering packages to and from your house, and many other houses like yours, we take an index of each package’s weight, size, shape, source, and destination addresses. To see a more technical list of the data we collect, check out our Data Security Policy.
Why does Rubica collect this data?
We need this data to keep you safe. The main reason is that cyber criminals and their attack methods continuously evolve. Knowing their past methods is not enough to keep you safe in the future. Rubica uses the data we collect to continually look forward for emerging criminal tactics that can be revealed as small anomalies in your data usage.
How is my data analyzed to keep me safe?
- Your device data traffic is analyzed both individually and in comparison to the rest of our client base by our 24/7 US-based team of cyber experts.
- If we detect anomalies in our analyses, we investigate for potential threats. If we find a threat, we write rules to define that pattern.
- All new rules we define are applied to our tools that continually protect all of our customers. In this way, each Rubica customer benefits from the patterns and potential threats we identify across our customer base.
Who has access to this data?
Only Rubica employees have access to your data. All of our employees undergo extensive background investigations (modeled after the process required by the U.S. and U.K. government intelligence agencies), including but not limited to investigations into past behaviors, reputation checks, and subject matter interviews performed by former law enforcement. We have a zero tolerance policy for misuse of any and all consumer data. All employees also sign nondisclosure and confidentiality agreements which protect both Rubica and client information. Lastly, only individuals tasked with the monitoring and maintenance of your data have access to any of it in raw or summarized form.
How does Rubica protect my data?
We deploy cybersecurity best practices in terms of access controls (both physical controls and virtual controls) to limit who can access your data, when and how. This information is kept in an isolated database that is only accessible from internal networks, which are protected behind leading enterprise grade security systems (IDS/IPS) and a firewall and are also monitored by our human cyber security experts.
We heavily vet and follow the gold standard for all internal systems such as password managers, file shares and communication tools. Rubica servers, laptops and mobile devices are fully locked down and remotely managed. Anytime a Rubica employee accesses a server or file with your data, the access is logged. Digital certificates, strong passwords and multi-factor authentication are all enforced. We continually run audits both internally and by third parties to improve these tools and our procedures.