Can you "Find Balance in Entrepreneurship"?
Charly takes some time today to discuss the challenges of balancing entrepreneurship with personal life.
Learn strategies for setting boundaries, managing priorities, and maintaining well-being.
Life is busy and there's just so many things to remember. What tools do you use to help you keep on top of ALL the things?
Most people reuse passwords across multiple accounts without thinking twice. But when just one of those accounts is breached, credential stuffing attacks can turn a single leak into a full-scale domino effect across your banking, email and business accounts.
In this episode, Charly covers:
✅ What credential stuffing is and why reused passwords make it so effective
✅ How breached credentials from forgotten sites end up on hacker trading lists
✅ Why your email account is the most critical password to protect first
✅ How to use Have I Been Pwned to check if your details have been exposed
✅ Why a password manager and multi-factor authentication are your best defences
If you have ever reused a password, this episode is your wake-up call to fix it before someone else does it for you.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey:...
Have you ever wondered whether your email address or password has been exposed in a data breach? With billions of compromised accounts floating around the internet, the chances are higher than you think.
In this episode, Charly covers:
✅ How to use the Have I Been Pwned website to check your email address against known breaches
✅ What compromised data actually looks like - from usernames and emails to passwords and physical addresses
✅ How to sign up for breach notifications so you are alerted when your data appears in future leaks
✅ Why reusing passwords across sites puts all your accounts at risk and what to do about it
This is a Walkthrough Wednesday episode - Charly walks you through the site step by step so you can check your own accounts today.
Have I Been Pwned: https://haveibeenpwned.com
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: ...
Most small business owners file IT security under “IT will handle it” and move on. But with nearly half of all cyber attacks targeting small businesses, treating security as someone else’s problem is a risk you cannot afford to take.
In this episode, Charly covers:
✅ Why IT security sits alongside building security, insurance and compliance as a core business function
✅ The staggering stat that over 40% of cyber insurance claims are denied because controls were not actually in place
✅ How your security posture directly affects your premiums, coverage terms and claim outcomes
✅ Three practical steps you can take right now: schedule regular reviews, document what is being done and know when to bring in expert help
If you would not leave your premises unlocked overnight, why leave your digital assets unprotected?
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: ...