Helm Select, Dale Gordon

Our Founding Story

The story of Helm Select began with a personal experience that underscored the urgent need for robust digital security.

Our founder, Dale Gordon, was thrust into the world of digital privacy when his wife, a respected national news anchor, rose to prominence. As her public profile grew, so did the threats to their personal security.

Dale quickly realized that today's political climate made digital security not just a luxury but a necessity. The safety of his family depended on it. Determined to protect his wife and their loved ones from the increasing risks of digital exposure, Dale drew on his extensive background in technology and security.

With a Bachelor of Science in Computer Science from Hampton University and an MBA from Georgetown University, Dale had the technical expertise and strategic insight to tackle complex security challenges. Over twenty years of professional experience in IT, securing data for global firms has equipped him with a deep understanding of digital threats and the methods to counter them. 

He discovered that many public and government figures faced similar challenges, struggling to safeguard their personal information and online presence. With his newfound expertise and a passion for helping others navigate this complex landscape, Dale founded Helm Select.

At Helm Select, we understand the unique vulnerabilities that come with public life. Our mission is to provide tailored digital privacy solutions that offer peace of mind to those who need it most. With a focus on proactive protection, confidentiality, and ongoing support, we help our clients stay ahead of digital threats and maintain their privacy in an ever-changing world.

Our founder’s personal journey fuels our commitment to protecting your digital identity.

Trust Helm Select to be your partner in security, safeguarding what matters most.

Public figure digital security

In today's digital age, maintaining privacy can feel like an uphill battle, especially for public and government figures like you.

We know the unique challenges and risks you face daily. We are here to help you navigate this complex landscape, providing the support and solutions you need to safeguard your digital identity. Let us be your trusted partner in ensuring your privacy and peace of mind.

Why Helm Select?

We’ve seen firsthand that many public and government figures face unique challenges in maintaining their digital privacy. That’s why we created Helm Select.

Whether you're just beginning to establish your public profile or looking to enhance your digital security, manage online risks, safeguard your personal data, or simply need guidance on protecting your online presence, we are here to help.

We offer comprehensive digital privacy services, including personalized consultations, risk assessments, and continuous monitoring, all backed by a team of leading privacy experts and security professionals.

We serve individuals across various sectors who require robust digital privacy solutions. Everyone deserves to feel secure in their digital interactions. Let us help you protect your privacy and ensure your peace of mind. 

Our Core Principles

Effective digital privacy management requires strategic planning, consistent vigilance, and continuous adaptation.

To support you in your journey, we’ve organized our content and services around a set of core principles, key stages in the digital privacy journey, situations you might encounter, and a broad range of privacy-related themes.

Core Principles

  1. Proactive Protection: Anticipating and mitigating risks before they become threats.

  2. Tailored Solutions: Providing customized strategies that meet your unique needs.

  3. Confidentiality and Discretion: Ensuring your information is handled with the utmost care.

  4. Ongoing Support: Offering continuous guidance to adapt to new challenges.

Key Stages in the Digital Privacy Journey

  1. Initial Assessment: Understanding your current privacy status and identifying potential vulnerabilities.

  2. Strategy Development: Creating a personalized plan to enhance your digital security.

  3. Implementation: Putting the privacy measures into action.

  4. Monitoring and Maintenance: Continuously monitoring your digital footprint and adjusting strategies as needed.