C-create affordable yet effective protective software for the average person to purchase
Y-Youth training program in teaching young teens that are interested in cybersecurity
B- Become a cybersecurity expert for a corporate business
E- Encryption services for high profile personalities(celebs)
R-Restoring files or lost information, for victims of a cyber attack
S-Self Recognition as an authentication method
E-Extortion prevention online
C- Child Pornography detection
U-Unauthorized online access detection
R-Recovery of lost passwords, passkeys, and emails.
I- Insurance fraud prevention
T-Tracking cybercriminals by creating a digital footprint
Y- Yearly upgrading technology for major businesses