Introduction
Hello ππ»
Small businesses and freelancing professionals have it difficult enough. Statistically they are more likely to suffer a data-breach, ransomware attack or other form of cybersecurity incident.
They are also the least prepared, clued-up or simply lack the bandwidth to get themselves into a position of strength. Fear also appears to be a crucial factor, along with feelings of embarrassment.
Do you not see yourself in the story so far?
Let me introduce you to my approach and help you be braver online. I started this site through my experiences as a ‘Digital Swiss Army Knife‘ over the years and many of my small business owning or self-employed clients asking me to give them something bit-sized yet wholesome, easy to digest yet impactful and costing less than a full-blown training course.
Here’s the menu, if you pardon my culinary analogy:
EntrΓ©e
This post serves as a starter to whet your appetite and hopefully make you curious enough to start with your first tutorial.
All tutorials are accessible through this website and contain supporting materials to make implementing what you have learned easier.
β No Subscriptions Just pay for what you want to learn.
β Concise and without jargon Means knowledge is easier to absorb.
β Templates and materials are included So you can apply what you have learned right away.

Spear Phishing
- It focuses on spear phishing, a type of cyber attack that targets specific individuals or organisations. It’s made much easier thanks to the advent of generative A.I. tools.
- It explains how to identify spear phishing attempts and how to counter them.
- It provides steps to take if you think you’ve been targeted.
- Includes: Dos & Don’ts poster.
Data Protection & GDPR
- It covers the basics of GDPR compliance for small businesses.
- It explains how GDPR applies to different types of businesses.
- It outlines common GDPR mistakes and how to avoid them.
- Includes: Compliance checklist and best practice poster.


Handling Customer Data
- It focuses on securely handling customer data, whether you sell online or off.
- It covers best practices for data encryption, access control, and secure storage.
It provides tips for securely sharing information and collaborating on documents. - Includes: best practice poster and template checklist.
Training your team
- It focuses on training employees about cybersecurity best practices. If there is only one of you, please feel yourself included.
- It covers topics like recognising phishing attempts, countering social engineering attempts and managing secrets (e.g. passwords, sensitive docs).
- It emphasises the importance of ongoing training and regular security updates.
- Includes: template training materials and schedule.


Handling Data Breaches
- It covers how to respond to a data breach.
- It outlines the steps to take, including notifying affected parties and mitigating damages.
- It emphasises the importance of transparency and prompt, pro-active communication during a breach.
- Includes: Template communications plan and checklist.