🔎🛡️ Are your security measures truly effective?
In this episode, Charly explores the importance of security audits in systematically evaluating your business’s defenses. Learn about different types of audits—compliance, technical, and operational—and discover how to act on audit findings to strengthen your security posture.
Audit Tools to investigate
Compliance Audits
Nessus - Offers both free and paid versions for vulnerability scanning across Windows, macOS, and Linux systems. It provides detailed auditing reports.
OpenVAS - An open-source vulnerability scanner with regular plugin updates, ideal for small businesses looking for an economic solution.
Qualys - Known for its cloud-based vulnerability management solution, which can be scalable for small businesses with its VMDR (Vulnerability Management, Detection and Response) feature.
Network Monitoring and Auditing
ManageEngine ADAudit Plus - Provides real-time Active Directory monitoring and auditing, helping to track user activity and changes to enhance security and ensure compliance.
SolarWinds Network Configuration Manager - Allows for the standardization and backup of network device configurations, which is crucial for maintaining network integrity.
Compliance and Risk Management
Vanta - A compliance management platform that automates compliance tasks, including security audits, which can be particularly useful for small businesses aiming to meet regulatory standards like SOC 2.
Sprinto - Focuses on compliance-driven testing with automation, suitable for businesses needing to quickly achieve compliance before audits. 🚀
Join the discussion in my community: https://askcharlyleetham.locals.com
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey: https://odysee.com/@askcharlyleetham:4
YouTube: https://youtube.com/askcharlyleetham
Facebook: https://www.facebook.com/askcharlyleetham
Twitter: https://twitter.com/yourbizmgr
Instagram: https://instagram.com/ask_charly_leetham
LinkedIn: www.linkedin.com/in/charlyleetham
LinkedIn Company: https://www.linkedin.com/company/ask-charly-leetham/
Spotify: https://open.spotify.com/show/3z49Z4uM8iD3jWFq4jOz8
Apple Podcasts: https://podcasts.apple.com/gb/podcast/ask-charly-leetham-online-business-manager/id1659738721
iHeartRadio: https://www.iheart.com/podcast/269-ask-charly-leetham-online-105944212/
Amazon Music: https://music.amazon.com/podcasts/662f1e44-115d-4094-862b-efe9307e0df4/ask-charly-leetham-online-business-manager
https://rumble.com/v6c1g7y-the-role-of-security-audits-in-protecting-your-business-2025378.html
Life is busy and there's just so many things to remember. What tools do you use to help you keep on top of ALL the things?
Need to let people know you're away over the holidays without replying to every email? In this episode, Charly walks you through how to set up an auto-responder in Zoho Mail — perfect for small teams, community clubs, and businesses winding down for the festive season.
📌 You’ll learn:
âś… How to create filters that trigger auto-responses
âś… What subject lines and sender addresses to use
âś… Tips for customizing your message for holiday closures
âś… Why this is especially useful if your contact form is always active
âś… How to organize responses into folders and tag them for follow-up
🛡️ Bonus: Don’t forget to turn it off when you’re back in action to avoid confusion.
📢Join the discussion in my community: https://askcharlyleetham.locals.com
Follow us:
Locals:
https://askcharlyleetham.locals.com
Rumble:
https://rumble.com/askcharlyleetham
Odyssey:
https://odysee.com/@askcharlyleetham:4
YouTube:
https://youtube.com/askcharlyleetham
Facebook:
...
Scam emails are getting sneakier — especially ones that pretend to be from Microsoft 365. In this episode, Charly breaks down a real phishing attempt forwarded by a client and explains why this time of year is peak season for attacks.
📌 You’ll learn:
✅ What red flags to spot in “Microsoft” scam emails
âś… Why end-of-year fatigue makes people easier targets
âś… The role of compromised WordPress sites in phishing
âś… What NOT to click and why even legit-looking messages can be fake
âś… How to build a safe process for checking suspicious emails
🛡️ If in doubt, always ask your tech team or support pro before clicking anything.
📢Join the discussion in my community: https://askcharlyleetham.locals.com
Follow us:
Locals:
https://askcharlyleetham.locals.com
Rumble:
https://rumble.com/askcharlyleetham
Odyssey:
https://odysee.com/@askcharlyleetham:4
YouTube:
https://youtube.com/askcharlyleetham
Facebook:
https://www.facebook.com/askcharlyleetham
Twitter:
...
Charly nearly fell for a scam email that looked like it came from Cloudflare — until he took a breath and had a proper look. In this episode, he walks through how he spotted it and what to do if you receive one just like it.
📌 You’ll learn:
âś… The telltale signs of a phishing email (even the sneaky ones)
âś… Why acting too quickly is a trap scammers count on
âś… What you should never click on without checking
âś… How to report scams and protect others
âś… Why even secure businesses can get hijacked
🔗 Check your domain’s safety with Charly’s recommended tool:
https://askcharlyleetham.com/likes/scamcheck
(Charly receives a commission for purchases made from this link)
📢Join the discussion in my community: https://askcharlyleetham.locals.com
Follow us:
Locals:
https://askcharlyleetham.locals.com
Rumble:
https://rumble.com/askcharlyleetham
Odyssey:
https://odysee.com/@askcharlyleetham:4
YouTube:
https://youtube.com/askcharlyleetham
Facebook:
...