Ask Charly Leetham
Science & Tech • Business
Our goal is to assist small to medium business owners use the power of the Internet as an avenue to market their organisations in an appropriate and cost-effective manner.

We assist small businesses to define and refine their processes, plan and build their web presence using current and emerging technologies.

We provide ongoing support and advice to assist businesses to
maintain and grow a crucial path to market and focus on growing your business
Interested? Want to learn more about the community?
Finding Balance in Entrepreneurship (2024/172)

Can you "Find Balance in Entrepreneurship"?

Charly takes some time today to discuss the challenges of balancing entrepreneurship with personal life.

Learn strategies for setting boundaries, managing priorities, and maintaining well-being.

post photo preview
placeholder
Interested? Want to learn more about the community?
What else you may like…
Videos
Posts
February 22, 2024
Remembering All The Things - Daily Dose Of Business Inspiration (2024/47)

Life is busy and there's just so many things to remember. What tools do you use to help you keep on top of ALL the things?

00:05:41
February 21, 2024
Practice The Pause - Daily Dose Of Business Inspiration (2024/46)

It's easy to react or respond quickly to messages and the like. It's better to do that mindfully. That's why I try to Practice The Pause.

00:03:54
February 20, 2024
Setting Boundaries Is Good For Business - Daily Dose Of Business Inspiration (2024/45)

Boundaries are important in life. Today we look at what that means in business.

00:04:34
April 03, 2026
What Happens When Your Reused Password Gets Breached? (2026/698)

Most people reuse passwords across multiple accounts without thinking twice. But when just one of those accounts is breached, credential stuffing attacks can turn a single leak into a full-scale domino effect across your banking, email and business accounts.

In this episode, Charly covers:

✅ What credential stuffing is and why reused passwords make it so effective
✅ How breached credentials from forgotten sites end up on hacker trading lists
✅ Why your email account is the most critical password to protect first
✅ How to use Have I Been Pwned to check if your details have been exposed
✅ Why a password manager and multi-factor authentication are your best defences

If you have ever reused a password, this episode is your wake-up call to fix it before someone else does it for you.

Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)


Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey:...

post photo preview
April 01, 2026
How Can You Check If Your Data Has Been Breached? (2026/697)

Have you ever wondered whether your email address or password has been exposed in a data breach? With billions of compromised accounts floating around the internet, the chances are higher than you think.

In this episode, Charly covers:

✅ How to use the Have I Been Pwned website to check your email address against known breaches
✅ What compromised data actually looks like - from usernames and emails to passwords and physical addresses
✅ How to sign up for breach notifications so you are alerted when your data appears in future leaks
✅ Why reusing passwords across sites puts all your accounts at risk and what to do about it

This is a Walkthrough Wednesday episode - Charly walks you through the site step by step so you can check your own accounts today.

Have I Been Pwned: https://haveibeenpwned.com

Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)


Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: ...

post photo preview
March 30, 2026
Is IT Security A Business Problem Or An IT Problem? (2026/696)

Most small business owners file IT security under “IT will handle it” and move on. But with nearly half of all cyber attacks targeting small businesses, treating security as someone else’s problem is a risk you cannot afford to take.

In this episode, Charly covers:

✅ Why IT security sits alongside building security, insurance and compliance as a core business function
✅ The staggering stat that over 40% of cyber insurance claims are denied because controls were not actually in place
✅ How your security posture directly affects your premiums, coverage terms and claim outcomes
✅ Three practical steps you can take right now: schedule regular reviews, document what is being done and know when to bring in expert help

If you would not leave your premises unlocked overnight, why leave your digital assets unprotected?

Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)


Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: ...

post photo preview
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals