Skip to main content

Johannesburg — Est. 2024

Your Search
Presence,
Protected & Found.

Set-and-forget digital optimization for families, elders, and service providers. Visibility. Privacy. Safety. No monthly subscriptions. No technical skills required.

The Framework

Three Pillars.
One Playbook.

Every solution maps to a pillar. Every pillar serves a real-world outcome for people who need results, not jargon.

Pillar 01

Visibility

Get found where it matters. Local SEO, Google Business Profile optimization, SERP positioning, and AI search readiness for 2026 and beyond.

Explore Solutions

Pillar 02

Privacy

Own your narrative online. Reputation management, content de-indexing, GDPR removal, and data legacy protection built for real people.

Explore Solutions

Pillar 03

Safety

Lock down your digital footprint. Cybersecurity health checks, data hygiene campaigns, anti-stalker sweeps, and 2FA setup for real security.

Explore Solutions
Featured Solutions

What We
Deliver

All Solutions →
01 — Visibility

Business Profile Optimization

Audit and optimize your Google Business Profile, schema markup, and local listing signals to rank in local packs and knowledge panels.

Set & Forget
02 — Visibility

Local Visibility Support

Citation management, review acquisition, and map-pack positioning for service providers needing local foot traffic and calls.

Local SEO
03 — Visibility

Content Strategy

Answer-first content planning for 2026 AI search readiness. Editorial calendars, SEO copywriting, and keyword intent mapping.

AI-Ready
04 — Privacy

Reputation Repair

Monitor and suppress harmful search results. Content removal, review dispute, and digital narrative rebuilding for individuals and businesses.

Privacy
05 — Safety

Cybersecurity Health Check

Basic website and account security audits. Identify exposure points, set up 2FA, and receive a plain-language remediation report.

Safety
06 — Visibility

Website Creation

End-to-end site builds optimized for search and conversions. Designed for set-and-forget operation with hosting and deployment included.

Web Build
Intel Hub

Standalone
Tools & Resources

Practical, self-contained toolkits. No login. No subscription. Built to solve one real problem, fast.

Browse All Intel →

Stop NCII

Guides, forms, and outreach templates for the Stop NCII initiative — protecting individuals from non-consensual image abuse.

Open Tool →

Job Market Toolkit

Resume keyword builder, job match checklist, and local market signals for South African job seekers and recruiters.

Open Tool →

Sextortion Defense

Emergency protocol, reporting templates, and evidence-preservation guide for sextortion victims. Plain language, immediate steps.

Open Tool →

Local Citation Scanner

Automated audit of your business listings across directories, maps, and data aggregators to find and fix inconsistencies.

The Search Playbook Collective

Join the
Search Playbook
Collective

A community of digital operatives, service providers, and advocates who deploy the Search Playbook framework for their own clients. Build local authority. Earn referral income.

  • Free Academy access — courses, guides, playbooks
  • Affiliate kit and referral tracking
  • Family/group membership — one pays, family joins
  • Earn by packaging services for local clients
  • Tactical intel drops and Search Playbook updates
Learn More →
Free to Join

The Search Playbook Collective
Academy · Community · Affiliate

Free Audit → View Solutions
Search Playbook Pricing

Free to Start.
Paid Once. Yours Forever.

Three pillars. Set-and-forget. No monthly fees. Come back when you need more.

Entry
Free Audit
Free
R750 value — no charge
  • Visibility snapshot
  • Reputation check
  • Cyber hygiene primer
  • 3 practical next steps
  • No obligation
Get Your Free Audit
Pillar 02 & 03
Privacy & Safety
From R1,500
Consultation · Scoped per situation
  • Reputation repair
  • Content suppression
  • Cyber hygiene
  • Sextortion / NCII response
  • Impersonation takedown
  • Confidential. Same-day.
Book Consultation
Max — WeMustCreate, Johannesburg
Who Is Max

One Person.
Real Results.

I'm Max — based in Johannesburg. I've spent years figuring out what actually works in the South African digital landscape, not overseas strategies that don't fit our realities.

My vision is simple: every family, elder, and local service provider deserves to be found online, stay safe, and own their narrative — without wasting money on agencies or being locked into monthly fees they can't afford.

Free to start. Paid once. Yours forever.

Free Audit — R750 Value

Visibility snapshot · Reputation check · Cyber hygiene primer · 3 practical next steps. No obligation. No sales pitch. Just straight talk about where you stand. Need more detail? Full Strategic Audit from R1,500.

Results vary per client and market conditions. Search Playbook provides optimization services — we do not guarantee specific search rankings or revenue outcomes. By engaging our services you agree to our Terms of Service and Privacy Policy.

Intel Hub

Intel Hub — Search Playbook
Tools · Resources · Cyber Hygiene

Intel Hub.
Your Digital Footprint Starts Here.

Free tools, emergency links, and a complete Cyber Hygiene guide — everything you need to understand your digital exposure, clean it up, and stay protected.

Free Tools

Use These.
Right Now. For Free.

The same tools we use in client work. All free. All accessible via the links below. No signup required for most.

NCII Protection
Emergency Tool
StopNCII — Image Abuse Protection

Intimate images being shared or threatened? Register them with StopNCII. Creates a fingerprint hash preventing re-upload across major platforms. Free. Anonymous.

Go to StopNCII →
Phishing Detection
Scam Detection
Phishing & Scam Link Checker

Got a suspicious link? Check it before you click. Scans URLs for phishing, malware, and known scam patterns without exposing your device.

Check a Link →
💧
Data Breach Check
Have I Been Pwned?

Enter your email and find out if it appeared in any known data breaches. Free. Immediate. If listed — change that password now.

Check Your Email →
🔍
Visibility Tool
Google Business Profile Check

Search your business name on Google Maps. If it doesn't appear — or the info is wrong — that's lost customers. Free to fix with a GBP claim.

Check Your Profile →
🗑️
Google Removal
Remove Content from Google Search

Google's official tool for requesting removal of personal information, outdated content, or sensitive data from search results.

Request Removal →
🚨
SA Reporting
Report Cybercrime — South Africa

SAPS cybercrime reporting for sextortion, online fraud, identity theft, and digital crimes. Keep your case number.

Report to SAPS →
Your Digital Footprint

Cyber Hygiene.
Clean It Up. Lock It Down.

Every time you sign up, post, search, or shop online — you leave a trail. Most people have no idea how much of their personal data is publicly accessible. This guide changes that.

What Is Your Digital Footprint?

Your digital footprint is everything online that links back to you — your name, phone number, address, photos, accounts, comments, purchases, and location data. Some of it you put there deliberately. Most of it you didn't. Data brokers, old accounts, public directories, and social platforms all contribute to a profile of you that anyone can find — including people who want to harm you.

01
Audit Your Exposure

Google your full name, phone number, and address. Screenshot everything that comes up. Check HaveIBeenPwned for breach exposure. This is your baseline.

02
Remove Data Broker Listings

Sites like PeopleFinder, Spokeo, and Whitepages aggregate your data and sell it. Submit opt-out requests to each. It takes time but it works.

03
Lock Down Active Accounts

Enable 2FA on every account. Use a password manager. Review privacy settings on all social platforms. Delete accounts you no longer use.

04
Set Up Ongoing Monitoring

Set a Google Alert for your name. Enable breach monitoring on HaveIBeenPwned. Review your exposure every 6 months. Stay ahead of it.

Hygiene Checklist

8 Things to Do
This Weekend.

🔍
Google yourself

Search your full name, phone number, and home address. See exactly what strangers can find about you right now.

💧
Check breach exposure

Go to haveibeenpwned.com and check every email address you've ever used. Change passwords on any that appear.

🔑
Enable 2FA everywhere

Turn on two-factor authentication on your email, banking, social media, and WhatsApp. This one step stops most account takeovers.

🗑️
Delete unused accounts

Every account you forgot about is a data leak waiting to happen. Use JustDeleteMe to find deletion pages for old services.

🔒
Audit social media privacy

Set Facebook, Instagram, and TikTok to Friends Only or Private. Remove your phone number and address from public profiles.

📋
Request data broker removal

Search your name on PeopleFinder, Spokeo, and Whitepages. Submit opt-out requests on each. Takes 30 minutes, pays off for years.

🔔
Set a Google Alert for your name

Go to google.com/alerts and create an alert for your full name. You'll be notified any time new content about you appears online.

📱
Review app permissions

Check which apps have access to your location, contacts, camera, and microphone. Revoke anything that doesn't need it.

Want expert help cleaning up your footprint? That's what the Cyber Hygiene consultation covers.

Book Free Audit →
Quick Reference

Platform Reporting.
Direct Links.

When you need to report fast — go directly to the platform form, not a help page.

Facebook & Instagram — Report Fake Account

Report impersonation, non-consensual images, or harassment to Meta's trust and safety team.

Report to Meta →
Google — Remove Personal Info from Search

Request removal of phone numbers, addresses, or intimate images from Google Search.

Google Removal Request →
WhatsApp — Report & Block

How to report and block accounts sending threatening messages on WhatsApp without them knowing.

WhatsApp Report Guide →
Cyber Helpline SA — Free Support

Free confidential support for victims of online abuse and cyberstalking in South Africa.

Get Free Support →
POPIA Complaints — Information Regulator SA

File a complaint if a company has misused your personal information under South African law.

Information Regulator →
TikTok — Report Intimate Image Abuse

TikTok's dedicated reporting for non-consensual intimate content via their safety portal.

TikTok Safety Portal →
Need More Help?

Tools Not Enough?
We Step In.

If you've worked through the checklist and still need expert support — book a Free Audit or contact us directly. Cyber Hygiene and Privacy consultations from R1,500.

background: linear-gradient(90deg, var(--gold), var(--cyan), transparent); } .sp-hub-hero-inner { position: relative; z-index: 2; padding: 72px 0; } .sp-hub-h1 { font-family: 'Unica One', sans-serif; font-size: clamp(2rem, 5vw, 3.5rem); color: var(--cream); line-height: 1.05; margin-bottom: 16px; } .sp-hub-h1 em { font-style: italic; color: var(--gold); } .sp-hub-hero-sub { font-size: 1rem; color: var(--cream-d); max-width: 560px; line-height: 1.8; font-weight: 600; margin-bottom: 28px; } /* Nav pills */ .sp-hub-nav { display: flex; gap: 10px; flex-wrap: wrap; } .sp-hub-nav-pill { font-family: 'Raleway', sans-serif; font-size: 0.68rem; font-weight: 700; letter-spacing: 0.1em; text-transform: uppercase; padding: 7px 16px; border-radius: 2px; border: 1px solid var(--border-s); color: var(--cream-d); transition: all 0.2s; cursor: pointer; } .sp-hub-nav-pill:hover { border-color: var(--gold-d); color: var(--gold); } /* Section titles */ .sp-hub-ctr { text-align: center; margin-bottom: 48px; } .sp-hub-h2 { font-family: 'Unica One', sans-serif; font-size: clamp(1.6rem, 3vw, 2.4rem); color: var(--cream); line-height: 1.1; margin-bottom: 12px; } .sp-hub-h2 em { font-style: italic; color: var(--gold); } .sp-hub-h2-cyan em { color: var(--cyan); } .sp-hub-sub { font-size: 0.95rem; color: var(--cream-d); max-width: 580px; margin: 0 auto; line-height: 1.8; font-weight: 600; } /* Tool cards */ .sp-hub-grid { display: grid; grid-template-columns: repeat(3,1fr); gap: 2px; } .sp-hub-card { background: var(--card); padding: 32px 28px; border-top: 3px solid transparent; transition: background 0.25s, border-top-color 0.25s; display: flex; flex-direction: column; } .sp-hub-card:hover { background: var(--card-b); } .sp-hub-card-cyan { border-top-color: var(--cyan); } .sp-hub-card-gold { border-top-color: var(--gold); } .sp-hub-card-red { border-top-color: var(--red); } .sp-hub-card-img { width: 100%; height: 140px; object-fit: cover; border-radius: 2px; margin-bottom: 16px; opacity: 0.85; } .sp-hub-card-icon { font-size: 1.6rem; margin-bottom: 10px; display: block; } .sp-hub-card-label { font-family: 'Raleway', sans-serif; font-size: 0.58rem; font-weight: 700; letter-spacing: 0.16em; text-transform: uppercase; color: var(--cream-d); margin-bottom: 4px; } .sp-hub-card-title { font-family: 'Unica One', sans-serif; font-size: 1.1rem; color: var(--cream); margin-bottom: 8px; line-height: 1.2; } .sp-hub-card-desc { font-size: 0.83rem; color: var(--cream-d); font-weight: 600; line-height: 1.7; margin-bottom: 18px; flex-grow: 1; } .sp-hub-card-link { display: inline-block; font-family: 'Raleway', sans-serif; font-size: 0.68rem; font-weight: 700; letter-spacing: 0.1em; text-transform: uppercase; padding: 9px 18px; border-radius: 2px; transition: all 0.2s ease; text-align: center; } .sp-hub-link-cyan { background: rgba(67,207,253,0.08); color: var(--cyan); border: 1px solid rgba(67,207,253,0.2); } .sp-hub-link-cyan:hover { background: rgba(67,207,253,0.15); } .sp-hub-link-gold { background: rgba(212,175,55,0.08); color: var(--gold); border: 1px solid var(--gold-d); } .sp-hub-link-gold:hover { background: rgba(212,175,55,0.15); } .sp-hub-link-red { background: rgba(220,38,38,0.08); color: var(--red); border: 1px solid rgba(220,38,38,0.25); } .sp-hub-link-red:hover { background: rgba(220,38,38,0.15); } /* Cyber Hygiene steps */ .sp-hub-steps { display: grid; grid-template-columns: repeat(4,1fr); gap: 2px; } .sp-hub-step { background: var(--card); padding: 32px 24px; } .sp-hub-step-num { font-family: 'Unica One', sans-serif; font-size: 3rem; color: rgba(67,207,253,0.1); line-height: 1; margin-bottom: 8px; } .sp-hub-step-title { font-family: 'Raleway', sans-serif; font-size: 0.85rem; font-weight: 700; color: var(--cyan); margin-bottom: 8px; } .sp-hub-step-desc { font-size: 0.8rem; color: var(--cream-d); font-weight: 600; line-height: 1.65; } /* Footprint checklist */ .sp-hub-checklist { display: grid; grid-template-columns: 1fr 1fr; gap: 2px; max-width: 900px; margin: 0 auto; } .sp-hub-check-item { background: var(--card); padding: 24px 28px; display: flex; gap: 16px; align-items: flex-start; transition: background 0.2s; } .sp-hub-check-item:hover { background: var(--card-b); } .sp-hub-check-icon { font-size: 1.4rem; flex-shrink: 0; margin-top: 2px; } .sp-hub-check-title { font-family: 'Raleway', sans-serif; font-size: 0.85rem; font-weight: 700; color: var(--cream); margin-bottom: 4px; } .sp-hub-check-desc { font-size: 0.8rem; color: var(--cream-d); font-weight: 600; line-height: 1.65; } /* Quick ref */ .sp-hub-ref { display: grid; grid-template-columns: 1fr 1fr; gap: 2px; } .sp-hub-ref-item { background: var(--card); padding: 24px 28px; border-left: 3px solid var(--gold-d); transition: border-left-color 0.2s; } .sp-hub-ref-item:hover { border-left-color: var(--gold); } .sp-hub-ref-title { font-family: 'Raleway', sans-serif; font-size: 0.82rem; font-weight: 700; color: var(--gold); margin-bottom: 6px; } .sp-hub-ref-desc { font-size: 0.82rem; color: var(--cream-d); font-weight: 600; line-height: 1.65; margin-bottom: 10px; } .sp-hub-ref-link { font-family: 'Raleway', sans-serif; font-size: 0.65rem; font-weight: 700; letter-spacing: 0.1em; text-transform: uppercase; color: var(--cyan); } .sp-hub-ref-link:hover { color: var(--gold); } /* CTA */ .sp-hub-cta { text-align: center; background: rgba(212,175,55,0.03); border: 1px solid var(--border); padding: 56px 48px; max-width: 720px; margin: 0 auto; position: relative; } .sp-hub-cta::before { content: ''; position: absolute; top: 0; left: 0; right: 0; height: 2px; background: linear-gradient(90deg, var(--gold), transparent); } .sp-hub-cta-title { font-family: 'Unica One', sans-serif; font-size: clamp(1.6rem,3vw,2.4rem); color: var(--cream); margin-bottom: 12px; } .sp-hub-cta-title em { font-style: italic; color: var(--gold); } .sp-hub-cta-sub { font-size: 0.92rem; color: var(--cream-d); font-weight: 600; margin-bottom: 24px; line-height: 1.8; } .sp-hub-btn { display: inline-block; font-family: 'Raleway', sans-serif; font-size: 0.78rem; font-weight: 700; letter-spacing: 0.12em; text-transform: uppercase; padding: 13px 28px; border-radius: 2px; transition: all 0.22s ease; } .sp-hub-btn-gold { background: var(--gold); color: var(--void); } .sp-hub-btn-gold:hover { background: var(--gold-l); transform: translateY(-2px); } .sp-hub-btn-out { background: transparent; color: var(--gold); border: 1px solid var(--gold-d); } .sp-hub-btn-out:hover { background: rgba(212,175,55,0.08); } @media (max-width: 900px) { .sp-hub-grid { grid-template-columns: 1fr 1fr; } .sp-hub-steps { grid-template-columns: 1fr 1fr; } .sp-hub-checklist { grid-template-columns: 1fr; } .sp-hub-ref { grid-template-columns: 1fr; } .sp-hub-wrap { padding: 0 20px; } .sp-hub-cta { padding: 36px 24px; } } @media (max-width: 560px) { .sp-hub-grid { grid-template-columns: 1fr; } }
Intel Hub — Search Playbook
Tools · Resources · Cyber Hygiene

Intel Hub.
Your Digital Footprint Starts Here.

Free tools, emergency links, and a complete Cyber Hygiene guide — everything you need to understand your digital exposure, clean it up, and stay protected.

Free Tools

Use These.
Right Now. For Free.

The same tools we use in client work. All free. All accessible via the links below. No signup required for most.

NCII Protection
Emergency Tool
StopNCII — Image Abuse Protection

Intimate images being shared or threatened? Register them with StopNCII. Creates a fingerprint hash preventing re-upload across major platforms. Free. Anonymous.

Go to StopNCII →
Phishing Detection
Scam Detection
Phishing & Scam Link Checker

Got a suspicious link? Check it before you click. Scans URLs for phishing, malware, and known scam patterns without exposing your device.

Check a Link →
💧
Data Breach Check
Have I Been Pwned?

Enter your email and find out if it appeared in any known data breaches. Free. Immediate. If listed — change that password now.

Check Your Email →
🔍
Visibility Tool
Google Business Profile Check

Search your business name on Google Maps. If it doesn't appear — or the info is wrong — that's lost customers. Free to fix with a GBP claim.

Check Your Profile →
🗑️
Google Removal
Remove Content from Google Search

Google's official tool for requesting removal of personal information, outdated content, or sensitive data from search results.

Request Removal →
🚨
SA Reporting
Report Cybercrime — South Africa

SAPS cybercrime reporting for sextortion, online fraud, identity theft, and digital crimes. Keep your case number.

Report to SAPS →
Your Digital Footprint

Cyber Hygiene.
Clean It Up. Lock It Down.

Every time you sign up, post, search, or shop online — you leave a trail. Most people have no idea how much of their personal data is publicly accessible. This guide changes that.

What Is Your Digital Footprint?

Your digital footprint is everything online that links back to you — your name, phone number, address, photos, accounts, comments, purchases, and location data. Some of it you put there deliberately. Most of it you didn't. Data brokers, old accounts, public directories, and social platforms all contribute to a profile of you that anyone can find — including people who want to harm you.

01
Audit Your Exposure

Google your full name, phone number, and address. Screenshot everything that comes up. Check HaveIBeenPwned for breach exposure. This is your baseline.

02
Remove Data Broker Listings

Sites like PeopleFinder, Spokeo, and Whitepages aggregate your data and sell it. Submit opt-out requests to each. It takes time but it works.

03
Lock Down Active Accounts

Enable 2FA on every account. Use a password manager. Review privacy settings on all social platforms. Delete accounts you no longer use.

04
Set Up Ongoing Monitoring

Set a Google Alert for your name. Enable breach monitoring on HaveIBeenPwned. Review your exposure every 6 months. Stay ahead of it.

Hygiene Checklist

8 Things to Do
This Weekend.

🔍
Google yourself

Search your full name, phone number, and home address. See exactly what strangers can find about you right now.

💧
Check breach exposure

Go to haveibeenpwned.com and check every email address you've ever used. Change passwords on any that appear.

🔑
Enable 2FA everywhere

Turn on two-factor authentication on your email, banking, social media, and WhatsApp. This one step stops most account takeovers.

🗑️
Delete unused accounts

Every account you forgot about is a data leak waiting to happen. Use JustDeleteMe to find deletion pages for old services.

🔒
Audit social media privacy

Set Facebook, Instagram, and TikTok to Friends Only or Private. Remove your phone number and address from public profiles.

📋
Request data broker removal

Search your name on PeopleFinder, Spokeo, and Whitepages. Submit opt-out requests on each. Takes 30 minutes, pays off for years.

🔔
Set a Google Alert for your name

Go to google.com/alerts and create an alert for your full name. You'll be notified any time new content about you appears online.

📱
Review app permissions

Check which apps have access to your location, contacts, camera, and microphone. Revoke anything that doesn't need it.

Want expert help cleaning up your footprint? That's what the Cyber Hygiene consultation covers.

Book Free Audit →
Quick Reference

Platform Reporting.
Direct Links.

When you need to report fast — go directly to the platform form, not a help page.

Facebook & Instagram — Report Fake Account

Report impersonation, non-consensual images, or harassment to Meta's trust and safety team.

Report to Meta →
Google — Remove Personal Info from Search

Request removal of phone numbers, addresses, or intimate images from Google Search.

Google Removal Request →
WhatsApp — Report & Block

How to report and block accounts sending threatening messages on WhatsApp without them knowing.

WhatsApp Report Guide →
Cyber Helpline SA — Free Support

Free confidential support for victims of online abuse and cyberstalking in South Africa.

Get Free Support →
POPIA Complaints — Information Regulator SA

File a complaint if a company has misused your personal information under South African law.

Information Regulator →
TikTok — Report Intimate Image Abuse

TikTok's dedicated reporting for non-consensual intimate content via their safety portal.

TikTok Safety Portal →
Need More Help?

Tools Not Enough?
We Step In.

If you've worked through the checklist and still need expert support — book a Free Audit or contact us directly. Cyber Hygiene and Privacy consultations from R1,500.

Pages

Pages

Page List

Pages

Pages