💳🔐 Are your e-commerce transactions secure?
In this episode, Charly explores essential strategies for protecting customer data and safeguarding your online store. Learn why using PCI-compliant payment gateways like Stripe or PayPal and implementing SSL certificates to encrypt data are critical steps for secure transactions.
Discover how to monitor for fraudulent activity with advanced detection tools and regular transaction reviews. Tune in to build trust with your customers and protect your e-commerce business from cyber threats! 🚀
Join the discussion in my community: https://askcharlyleetham.locals.com
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey: https://odysee.com/@askcharlyleetham:4
YouTube: https://youtube.com/askcharlyleetham
Facebook: https://www.facebook.com/askcharlyleetham
Twitter: https://twitter.com/yourbizmgr
Instagram: https://instagram.com/ask_charly_leetham
LinkedIn: www.linkedin.com/in/charlyleetham
LinkedIn Company: https://www.linkedin.com/company/ask-charly-leetham/
Spotify: https://open.spotify.com/show/3z49Z4uM8iD3jWFq4jOz8
Apple Podcasts: https://podcasts.apple.com/gb/podcast/ask-charly-leetham-online-business-manager/id1659738721
iHeartRadio: https://www.iheart.com/podcast/269-ask-charly-leetham-online-105944212/
Amazon Music: https://music.amazon.com/podcasts/662f1e44-115d-4094-862b-efe9307e0df4/ask-charly-leetham-online-business-manager
https://rumble.com/v66njlv-how-to-secure-your-businesss-e-commerce-transactions-2025364.html
Life is busy and there's just so many things to remember. What tools do you use to help you keep on top of ALL the things?
You verify your age on an app, scan your face, upload your licence, and assume that is all that happens. A quick check, data deleted, move on. But security researchers have just exposed Persona's source code - left unprotected on a government-certified server - and what they found goes well beyond checking birthdays.
In this episode, Charly covers:
✅ How Persona's source code ended up exposed on a public FedRAMP-certified server - and why this was not a hack
✅ The 269 distinct verification checks the system is capable of running, from facial recognition to watchlist screening
✅ Intelligence programme code names found in the code, including Project Shadow and Project Legion
✅ Why centralised biometric databases are honeypots - and the pattern of breaches that proves it
✅ What Australia's new age verification laws mean when the companies involved keep failing to secure your data
✅ Practical steps to protect yourself, your family, and your business right now
If you use any platform that required age ...
Need to give a developer or IT support person access to your Cloudflare account but not sure where to start? Getting the permissions right matters - too much access is a security risk, and too little means they can't do their job.
In this episode, Charly covers:
✅ How to invite a new member to your Cloudflare account step by step
✅ The difference between Super Administrator, Administrator, and DNS-only access levels
✅ How to restrict access to specific domains instead of your entire account
✅ How to edit permissions, resend invites, and remove members when you're done
If you're bringing someone in to help manage your Cloudflare setup, this walkthrough will show you exactly how to do it securely - and how to clean up access when the job is finished.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey: ...
AI tools promise you can build a website in minutes just by describing what you want - but what happens after the demo video ends? Vibe coding has taken social media by storm, and small business owners are wondering if they even need a web developer anymore.
In this episode, Charly covers:
✅ What vibe coding actually is and why it appeals to business owners
✅ The hidden time costs that make your "free" website surprisingly expensive
✅ Six critical security gaps AI-generated code commonly leaves wide open - from SQL injection to exposed credentials
✅ Why "good enough" can be the most costly option for your business
✅ When vibe coding makes sense and when it absolutely does not
✅ The hybrid approach - using AI for ideas and content while letting a professional handle the technical build
Your website is your first impression. Make sure the foundations are solid before you go live.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow ...