Skip to main content

Johannesburg — Est. 2024

Your Search
Presence,
Protected & Found.

Set-and-forget digital optimization for families, elders, and service providers. Visibility. Privacy. Safety. No monthly subscriptions. No technical skills required.

The Framework

Three Pillars.
One Playbook.

Every solution maps to a pillar. Every pillar serves a real-world outcome for people who need results, not jargon.

Pillar 01

Visibility

Get found where it matters. Local SEO, Google Business Profile optimization, SERP positioning, and AI search readiness for 2026 and beyond.

Explore Solutions

Pillar 02

Privacy

Own your narrative online. Reputation management, content de-indexing, GDPR removal, and data legacy protection built for real people.

Explore Solutions

Pillar 03

Safety

Lock down your digital footprint. Cybersecurity health checks, data hygiene campaigns, anti-stalker sweeps, and 2FA setup for real security.

Explore Solutions
Featured Solutions

What We
Deliver

All Solutions →
01 — Visibility

Business Profile Optimization

Audit and optimize your Google Business Profile, schema markup, and local listing signals to rank in local packs and knowledge panels.

Set & Forget
02 — Visibility

Local Visibility Support

Citation management, review acquisition, and map-pack positioning for service providers needing local foot traffic and calls.

Local SEO
03 — Visibility

Content Strategy

Answer-first content planning for 2026 AI search readiness. Editorial calendars, SEO copywriting, and keyword intent mapping.

AI-Ready
04 — Privacy

Reputation Repair

Monitor and suppress harmful search results. Content removal, review dispute, and digital narrative rebuilding for individuals and businesses.

Privacy
05 — Safety

Cybersecurity Health Check

Basic website and account security audits. Identify exposure points, set up 2FA, and receive a plain-language remediation report.

Safety
06 — Visibility

Website Creation

End-to-end site builds optimized for search and conversions. Designed for set-and-forget operation with hosting and deployment included.

Web Build
Intel Hub

Standalone
Tools & Resources

Practical, self-contained toolkits. No login. No subscription. Built to solve one real problem, fast.

Browse All Intel →

Stop NCII

Guides, forms, and outreach templates for the Stop NCII initiative — protecting individuals from non-consensual image abuse.

Open Tool →

Job Market Toolkit

Resume keyword builder, job match checklist, and local market signals for South African job seekers and recruiters.

Open Tool →

Sextortion Defense

Emergency protocol, reporting templates, and evidence-preservation guide for sextortion victims. Plain language, immediate steps.

Open Tool →

Local Citation Scanner

Automated audit of your business listings across directories, maps, and data aggregators to find and fix inconsistencies.

The Search Playbook Collective

Join the
Search Playbook
Collective

A community of digital operatives, service providers, and advocates who deploy the Search Playbook framework for their own clients. Build local authority. Earn referral income.

  • Free Academy access — courses, guides, playbooks
  • Affiliate kit and referral tracking
  • Family/group membership — one pays, family joins
  • Earn by packaging services for local clients
  • Tactical intel drops and Search Playbook updates
Learn More →
Free to Join

The Search Playbook Collective
Academy · Community · Affiliate

Free Audit → View Solutions
Search Playbook Pricing

Free to Start.
Paid Once. Yours Forever.

Three pillars. Set-and-forget. No monthly fees. Come back when you need more.

Entry
Free Audit
Free
R750 value — no charge
  • Visibility snapshot
  • Reputation check
  • Cyber hygiene primer
  • 3 practical next steps
  • No obligation
Get Your Free Audit
Pillar 02 & 03
Privacy & Safety
From R1,500
Consultation · Scoped per situation
  • Reputation repair
  • Content suppression
  • Cyber hygiene
  • Sextortion / NCII response
  • Impersonation takedown
  • Confidential. Same-day.
Book Consultation
Max — WeMustCreate, Johannesburg
Who Is Max

One Person.
Real Results.

I'm Max — based in Johannesburg. I've spent years figuring out what actually works in the South African digital landscape, not overseas strategies that don't fit our realities.

My vision is simple: every family, elder, and local service provider deserves to be found online, stay safe, and own their narrative — without wasting money on agencies or being locked into monthly fees they can't afford.

Free to start. Paid once. Yours forever.

Free Audit — R750 Value

Visibility snapshot · Reputation check · Cyber hygiene primer · 3 practical next steps. No obligation. No sales pitch. Just straight talk about where you stand. Need more detail? Full Strategic Audit from R1,500.

Results vary per client and market conditions. Search Playbook provides optimization services — we do not guarantee specific search rankings or revenue outcomes. By engaging our services you agree to our Terms of Service and Privacy Policy.

Safety

Safety Protocol — Digital Threat Response
🚨 Urgent? WhatsApp now: +27 72 717 0772
Pillar 03 — Safety Protocol

Your Digital Footprint
Is the Target.

Every account, photo, number, and post you've ever shared online is part of your digital footprint. When bad actors find it — sextortion, impersonation, stalking, and harassment follow. We stop it fast.

Why It Happens

Your Footprint Is
Bigger Than You Think.

Most people don't realise how much of their personal information is publicly accessible online — until something goes wrong.

What Is a Digital Footprint?

Your digital footprint is everything that can be found about you online — your name, phone number, home address, photos, social media accounts, old forum posts, data broker listings, and more. Most of it you didn't knowingly put there.

Criminals, abusers, and stalkers use this information to target victims. They don't need to hack anything. They use the same Google searches you do — and find everything they need to cause harm.

The Search Playbook Safety Protocol reduces your exposure, responds to active threats, and protects what matters.

📍
Location Data

Your check-ins, tagged photos, and location history tell anyone exactly where you live, work, and spend time.

📱
Old Accounts

Forgotten profiles on old platforms still hold your photos, email, and personal details — available to anyone who looks.

🗂️
Data Broker Listings

Directories like PeopleFinder and Spokeo publish your address, phone, and family members — without your consent.

🔓
Data Breaches

If your email appeared in a breach, your password and personal details may be circulating on the dark web right now.

📸
Photos & Media

Images you've shared — even privately — can be downloaded, screenshotted, and weaponised. Once out, they spread fast.

🔗
Connected Accounts

Logging in with Google or Facebook links your accounts together. One breach can expose everything connected to it.

What We Handle

If It's Happening Online,
We Can Help.

Most digital threats feel overwhelming because victims don't know what steps to take. We do. We've dealt with these situations before and we know exactly how to respond.

🔒
Sextortion & NCII

Someone threatening to share intimate images unless you pay — or has already shared them without your consent.

  • Immediate triage and response plan
  • Platform reporting — Meta, Google, X
  • StopNCII hash registration
  • Legal referral if needed
👤
Impersonation

A fake account using your name, photos, or business identity to deceive people or destroy your reputation.

  • Fake account identification
  • Platform takedown requests
  • Evidence documentation
  • Identity protection setup
🕵️
Stalking & Harassment

Someone tracking your location, monitoring your activity, or systematically targeting you online.

  • Digital footprint reduction
  • Data broker removal requests
  • Location data cleanup
  • Anti-stalker sweep
🔑
Account Compromise

Someone has accessed your email, social media, or accounts without your permission.

  • Account recovery guidance
  • 2FA lockdown across all accounts
  • Password manager setup
  • Breach monitoring activation
Fake Reviews & Brand Attacks

Coordinated fake negative reviews or a competitor attacking your business reputation online.

  • Fake review identification
  • Google flagging & removal requests
  • Reputation counter-strategy
  • Positive review acceleration
🛡️
Cyber Hygiene Audit

You haven't been attacked yet — but you want to lock down your digital life before something happens.

  • Full digital exposure scan
  • Password & account security check
  • Privacy settings audit
  • Prevention plan
The Process

What Happens When
You Contact Us

01
You Reach Out

Via the Connect form or WhatsApp directly. Tell us what's happening — brief is fine.

02
Same-Day Response

We respond within hours. Critical threats get immediate attention — no waiting queue.

03
Scoped & Quoted

We assess the situation, explain what's possible, and give you a clear scope and price.

04
We Get to Work

Takedowns, reports, recovery, and protection — handled confidentially from start to finish.

Pricing
From R1,500
Consultation · Scoped per situation · Same-day response

Every situation is different. We scope the work honestly and charge accordingly. Not sure where to start? Book the Free Audit and we'll point you in the right direction.

Results vary per situation. Search Playbook provides guidance and optimisation services — outcomes depend on platform cooperation and individual circumstances. By engaging our services you agree to our Terms of Service and Privacy Policy.

border-radius: 2px; margin-bottom: 16px;
Safety Protocol — Digital Threat Response
🚨 Urgent? WhatsApp now: +27 72 717 0772
Pillar 03 — Safety Protocol

Your Digital Footprint
Is the Target.

Every account, photo, number, and post you've ever shared online is part of your digital footprint. When bad actors find it — sextortion, impersonation, stalking, and harassment follow. We stop it fast.

Why It Happens

Your Footprint Is
Bigger Than You Think.

Most people don't realise how much of their personal information is publicly accessible online — until something goes wrong.

What Is a Digital Footprint?

Your digital footprint is everything that can be found about you online — your name, phone number, home address, photos, social media accounts, old forum posts, data broker listings, and more. Most of it you didn't knowingly put there.

Criminals, abusers, and stalkers use this information to target victims. They don't need to hack anything. They use the same Google searches you do — and find everything they need to cause harm.

The Search Playbook Safety Protocol reduces your exposure, responds to active threats, and protects what matters.

📍
Location Data

Your check-ins, tagged photos, and location history tell anyone exactly where you live, work, and spend time.

📱
Old Accounts

Forgotten profiles on old platforms still hold your photos, email, and personal details — available to anyone who looks.

🗂️
Data Broker Listings

Directories like PeopleFinder and Spokeo publish your address, phone, and family members — without your consent.

🔓
Data Breaches

If your email appeared in a breach, your password and personal details may be circulating on the dark web right now.

📸
Photos & Media

Images you've shared — even privately — can be downloaded, screenshotted, and weaponised. Once out, they spread fast.

🔗
Connected Accounts

Logging in with Google or Facebook links your accounts together. One breach can expose everything connected to it.

What We Handle

If It's Happening Online,
We Can Help.

Most digital threats feel overwhelming because victims don't know what steps to take. We do. We've dealt with these situations before and we know exactly how to respond.

🔒
Sextortion & NCII

Someone threatening to share intimate images unless you pay — or has already shared them without your consent.

  • Immediate triage and response plan
  • Platform reporting — Meta, Google, X
  • StopNCII hash registration
  • Legal referral if needed
👤
Impersonation

A fake account using your name, photos, or business identity to deceive people or destroy your reputation.

  • Fake account identification
  • Platform takedown requests
  • Evidence documentation
  • Identity protection setup
🕵️
Stalking & Harassment

Someone tracking your location, monitoring your activity, or systematically targeting you online.

  • Digital footprint reduction
  • Data broker removal requests
  • Location data cleanup
  • Anti-stalker sweep
🔑
Account Compromise

Someone has accessed your email, social media, or accounts without your permission.

  • Account recovery guidance
  • 2FA lockdown across all accounts
  • Password manager setup
  • Breach monitoring activation
Fake Reviews & Brand Attacks

Coordinated fake negative reviews or a competitor attacking your business reputation online.

  • Fake review identification
  • Google flagging & removal requests
  • Reputation counter-strategy
  • Positive review acceleration
🛡️
Cyber Hygiene Audit

You haven't been attacked yet — but you want to lock down your digital life before something happens.

  • Full digital exposure scan
  • Password & account security check
  • Privacy settings audit
  • Prevention plan
The Process

What Happens When
You Contact Us

01
You Reach Out

Via the Connect form or WhatsApp directly. Tell us what's happening — brief is fine.

02
Same-Day Response

We respond within hours. Critical threats get immediate attention — no waiting queue.

03
Scoped & Quoted

We assess the situation, explain what's possible, and give you a clear scope and price.

04
We Get to Work

Takedowns, reports, recovery, and protection — handled confidentially from start to finish.

Pricing
From R1,500
Consultation · Scoped per situation · Same-day response

Every situation is different. We scope the work honestly and charge accordingly. Not sure where to start? Book the Free Audit and we'll point you in the right direction.

Results vary per situation. Search Playbook provides guidance and optimisation services — outcomes depend on platform cooperation and individual circumstances. By engaging our services you agree to our Terms of Service and Privacy Policy.

} /* Hero */ .sp-saf-hero { position: relative; min-height: 460px; display: flex; align-items: center; background: var(--void); overflow: hidden; border-bottom: 1px solid rgba(220,38,38,0.2); } .sp-saf-hero-img { position: absolute; inset: 0; width: 100%; height: 100%; object-fit: cover; opacity: 0.22; mix-blend-mode: luminosity; } .sp-saf-hero-overlay { position: absolute; inset: 0; background: linear-gradient(135deg, rgba(9,9,11,0.96) 40%, rgba(9,9,11,0.5) 100%); } .sp-saf-hero-overlay::after { content: ''; position: absolute; top: 0; left: 0; right: 0; height: 2px; background: linear-gradient(90deg, var(--red), transparent); } .sp-saf-hero-inner { position: relative; z-index: 2; padding: 80px 0; } .sp-saf-urgent { background: rgba(220,38,38,0.1); border: 1px solid rgba(220,38,38,0.3); border-left: 4px solid var(--red); padding: 14px 20px; margin-bottom: 28px; font-family: 'Raleway', sans-serif; font-size: 0.88rem; font-weight: 700; color: var(--cream); display: flex; align-items: center; gap: 12px; max-width: 580px; } .sp-saf-h1 { font-family: 'Unica One', sans-serif; font-size: clamp(2.2rem, 5vw, 3.8rem); color: var(--cream); line-height: 1.05; margin-bottom: 20px; } .sp-saf-h1 em { font-style: italic; color: var(--red); } .sp-saf-hero-sub { font-size: 1.15rem; color: var(--cream-d); max-width: 580px; line-height: 1.9; margin-bottom: 36px; font-weight: 600; } /* Buttons */ .sp-saf-btn { display: inline-block; font-family: 'Raleway', sans-serif; font-size: 0.82rem; font-weight: 700; letter-spacing: 0.1em; text-transform: uppercase; padding: 14px 30px; cursor: pointer; transition: all 0.22s ease; border-radius: 2px; } .sp-saf-btn-red { background: var(--red); color: #fff; border: none; } .sp-saf-btn-red:hover { background: var(--red-l); transform: translateY(-2px); } .sp-saf-btn-out { background: transparent; color: var(--red-l); border: 1px solid rgba(220,38,38,0.35); } .sp-saf-btn-out:hover { background: rgba(220,38,38,0.08); } /* Section titles */ .sp-saf-ctr { text-align: center; margin-bottom: 56px; } .sp-saf-h2 { font-family: 'Unica One', sans-serif; font-size: clamp(1.8rem, 3.5vw, 2.6rem); color: var(--cream); line-height: 1.1; margin-bottom: 14px; } .sp-saf-h2 em { font-style: italic; color: var(--red); } .sp-saf-sub { font-size: 1.1rem; color: var(--cream-d); max-width: 640px; margin: 0 auto; line-height: 1.9; font-weight: 600; } /* Digital footprint explainer */ .sp-saf-footprint { background: var(--card); border-left: 4px solid var(--red); padding: 36px 40px; margin-bottom: 4px; } .sp-saf-footprint-title { font-family: 'Unica One', sans-serif; font-size: 1.4rem; color: var(--red-l); margin-bottom: 14px; } .sp-saf-footprint p { font-size: 1.05rem; color: var(--cream-d); font-weight: 600; line-height: 1.9; margin-bottom: 14px; } .sp-saf-footprint p:last-child { margin-bottom: 0; } .sp-saf-footprint strong { color: var(--cream); } /* Footprint signals grid */ .sp-saf-signals { display: grid; grid-template-columns: repeat(3,1fr); gap: 2px; margin-top: 4px; } .sp-saf-signal { background: var(--card); padding: 28px 24px; border-top: 3px solid rgba(220,38,38,0.2); transition: border-top-color 0.2s, background 0.2s; } .sp-saf-signal:hover { border-top-color: var(--red); background: var(--card-b); } .sp-saf-signal-icon { font-size: 1.8rem; margin-bottom: 10px; display: block; } .sp-saf-signal-title { font-family: 'Raleway', sans-serif; font-size: 0.95rem; font-weight: 700; color: var(--cream); margin-bottom: 8px; } .sp-saf-signal-desc { font-size: 1rem; color: var(--cream-d); font-weight: 600; line-height: 1.8; } /* Threat cards */ .sp-saf-grid { display: grid; grid-template-columns: repeat(3,1fr); gap: 2px; } .sp-saf-card { background: var(--card); padding: 32px 28px; border-top: 3px solid rgba(220,38,38,0.2); transition: border-top-color 0.25s, background 0.25s; } .sp-saf-card:hover { border-top-color: var(--red); background: var(--card-b); } .sp-saf-card-icon { font-size: 1.8rem; margin-bottom: 12px; display: block; } .sp-saf-card-title { font-family: 'Unica One', sans-serif; font-size: 1.15rem; color: var(--red-l); margin-bottom: 10px; } .sp-saf-card-desc { font-size: 1rem; color: var(--cream-d); font-weight: 600; line-height: 1.8; margin-bottom: 16px; } .sp-saf-list { list-style: none; } .sp-saf-list li { display: flex; gap: 10px; font-size: 0.95rem; font-weight: 600; color: var(--cream-d); padding: 6px 0; border-bottom: 1px solid var(--border-s); align-items: flex-start; line-height: 1.6; } .sp-saf-list li:last-child { border-bottom: none; } .sp-saf-ck { color: var(--red); font-weight: 800; flex-shrink: 0; margin-top: 1px; } /* How it works */ .sp-saf-steps { display: grid; grid-template-columns: repeat(4,1fr); gap: 2px; } .sp-saf-step { background: var(--card); padding: 32px 24px; text-align: center; } .sp-saf-step-num { font-family: 'Unica One', sans-serif; font-size: 3rem; color: rgba(220,38,38,0.15); line-height: 1; margin-bottom: 10px; } .sp-saf-step-title { font-family: 'Raleway', sans-serif; font-size: 0.92rem; font-weight: 700; color: var(--cream); margin-bottom: 10px; } .sp-saf-step-desc { font-size: 0.95rem; color: var(--cream-d); font-weight: 600; line-height: 1.75; } /* CTA */ .sp-saf-cta { background: rgba(220,38,38,0.04); border: 1px solid rgba(220,38,38,0.2); padding: 56px 48px; text-align: center; max-width: 760px; margin: 0 auto; position: relative; } .sp-saf-cta::before { content: ''; position: absolute; top: 0; left: 0; right: 0; height: 2px; background: linear-gradient(90deg, var(--red), transparent); } .sp-saf-cta-price { font-family: 'Unica One', sans-serif; font-size: clamp(3rem, 6vw, 5rem); color: var(--red); line-height: 1; margin-bottom: 8px; } .sp-saf-cta-note { font-family: 'Raleway', sans-serif; font-size: 0.82rem; font-weight: 700; letter-spacing: 0.1em; text-transform: uppercase; color: var(--cream-d); margin-bottom: 20px; } .sp-saf-cta-desc { font-size: 1.05rem; color: var(--cream-d); font-weight: 600; margin-bottom: 28px; line-height: 1.9; } .sp-saf-disclaimer { font-size: 0.78rem; color: #52525B; margin-top: 16px; line-height: 1.7; } .sp-saf-disclaimer a { color: #71717A; text-decoration: underline; } @media (max-width: 900px) { .sp-saf-grid { grid-template-columns: 1fr 1fr; } .sp-saf-steps { grid-template-columns: 1fr 1fr; } .sp-saf-signals { grid-template-columns: 1fr 1fr; } .sp-saf-wrap { padding: 0 20px; } .sp-saf-cta { padding: 36px 24px; } .sp-saf-footprint { padding: 28px 24px; } } @media (max-width: 560px) { .sp-saf-grid { grid-template-columns: 1fr; } .sp-saf-signals { grid-template-columns: 1fr; } }
Safety Protocol — Digital Threat Response
🚨 Urgent? WhatsApp now: +27 72 717 0772
Pillar 03 — Safety Protocol

Your Digital Footprint
Is the Target.

Every account, photo, number, and post you've ever shared online is part of your digital footprint. When bad actors find it — sextortion, impersonation, stalking, and harassment follow. We stop it fast.

Why It Happens

Your Footprint Is
Bigger Than You Think.

Most people don't realise how much of their personal information is publicly accessible online — until something goes wrong.

What Is a Digital Footprint?

Your digital footprint is everything that can be found about you online — your name, phone number, home address, photos, social media accounts, old forum posts, data broker listings, and more. Most of it you didn't knowingly put there.

Criminals, abusers, and stalkers use this information to target victims. They don't need to hack anything. They use the same Google searches you do — and find everything they need to cause harm.

The Search Playbook Safety Protocol reduces your exposure, responds to active threats, and protects what matters.

📍
Location Data

Your check-ins, tagged photos, and location history tell anyone exactly where you live, work, and spend time.

📱
Old Accounts

Forgotten profiles on old platforms still hold your photos, email, and personal details — available to anyone who looks.

🗂️
Data Broker Listings

Directories like PeopleFinder and Spokeo publish your address, phone, and family members — without your consent.

🔓
Data Breaches

If your email appeared in a breach, your password and personal details may be circulating on the dark web right now.

📸
Photos & Media

Images you've shared — even privately — can be downloaded, screenshotted, and weaponised. Once out, they spread fast.

🔗
Connected Accounts

Logging in with Google or Facebook links your accounts together. One breach can expose everything connected to it.

What We Handle

If It's Happening Online,
We Can Help.

Most digital threats feel overwhelming because victims don't know what steps to take. We do. We've dealt with these situations before and we know exactly how to respond.

🔒
Sextortion & NCII

Someone threatening to share intimate images unless you pay — or has already shared them without your consent.

  • Immediate triage and response plan
  • Platform reporting — Meta, Google, X
  • StopNCII hash registration
  • Legal referral if needed
👤
Impersonation

A fake account using your name, photos, or business identity to deceive people or destroy your reputation.

  • Fake account identification
  • Platform takedown requests
  • Evidence documentation
  • Identity protection setup
🕵️
Stalking & Harassment

Someone tracking your location, monitoring your activity, or systematically targeting you online.

  • Digital footprint reduction
  • Data broker removal requests
  • Location data cleanup
  • Anti-stalker sweep
🔑
Account Compromise

Someone has accessed your email, social media, or accounts without your permission.

  • Account recovery guidance
  • 2FA lockdown across all accounts
  • Password manager setup
  • Breach monitoring activation
Fake Reviews & Brand Attacks

Coordinated fake negative reviews or a competitor attacking your business reputation online.

  • Fake review identification
  • Google flagging & removal requests
  • Reputation counter-strategy
  • Positive review acceleration
🛡️
Cyber Hygiene Audit

You haven't been attacked yet — but you want to lock down your digital life before something happens.

  • Full digital exposure scan
  • Password & account security check
  • Privacy settings audit
  • Prevention plan
The Process

What Happens When
You Contact Us

01
You Reach Out

Via the Connect form or WhatsApp directly. Tell us what's happening — brief is fine.

02
Same-Day Response

We respond within hours. Critical threats get immediate attention — no waiting queue.

03
Scoped & Quoted

We assess the situation, explain what's possible, and give you a clear scope and price.

04
We Get to Work

Takedowns, reports, recovery, and protection — handled confidentially from start to finish.

Pri
Safety Protocol — Digital Threat Response
🚨 Urgent? WhatsApp now: +27 72 717 0772
Pillar 03 — Safety Protocol

Your Digital Footprint
Is the Target.

Every account, photo, number, and post you've ever shared online is part of your digital footprint. When bad actors find it — sextortion, impersonation, stalking, and harassment follow. We stop it fast.

Why It Happens

Your Footprint Is
Bigger Than You Think.

Most people don't realise how much of their personal information is publicly accessible online — until something goes wrong.

What Is a Digital Footprint?

Your digital footprint is everything that can be found about you online — your name, phone number, home address, photos, social media accounts, old forum posts, data broker listings, and more. Most of it you didn't knowingly put there.

Criminals, abusers, and stalkers use this information to target victims. They don't need to hack anything. They use the same Google searches you do — and find everything they need to cause harm.

The Search Playbook Safety Protocol reduces your exposure, responds to active threats, and protects what matters.

📍
Location Data

Your check-ins, tagged photos, and location history tell anyone exactly where you live, work, and spend time.

📱
Old Accounts

Forgotten profiles on old platforms still hold your photos, email, and personal details — available to anyone who looks.

🗂️
Data Broker Listings

Directories like PeopleFinder and Spokeo publish your address, phone, and family members — without your consent.

🔓
Data Breaches

If your email appeared in a breach, your password and personal details may be circulating on the dark web right now.

📸
Photos & Media

Images you've shared — even privately — can be downloaded, screenshotted, and weaponised. Once out, they spread fast.

🔗
Connected Accounts

Logging in with Google or Facebook links your accounts together. One breach can expose everything connected to it.

What We Handle

If It's Happening Online,
We Can Help.

Most digital threats feel overwhelming because victims don't know what steps to take. We do. We've dealt with these situations before and we know exactly how to respond.

🔒
Sextortion & NCII

Someone threatening to share intimate images unless you pay — or has already shared them without your consent.

  • Immediate triage and response plan
  • Platform reporting — Meta, Google, X
  • StopNCII hash registration
  • Legal referral if needed
👤
Impersonation

A fake account using your name, photos, or business identity to deceive people or destroy your reputation.

  • Fake account identification
  • Platform takedown requests
  • Evidence documentation
  • Identity protection setup
🕵️
Stalking & Harassment

Someone tracking your location, monitoring your activity, or systematically targeting you online.

  • Digital footprint reduction
  • Data broker removal requests
  • Location data cleanup
  • Anti-stalker sweep
🔑
Account Compromise

Someone has accessed your email, social media, or accounts without your permission.

  • Account recovery guidance
  • 2FA lockdown across all accounts
  • Password manager setup
  • Breach monitoring activation
Fake Reviews & Brand Attacks

Coordinated fake negative reviews or a competitor attacking your business reputation online.

  • Fake review identification
  • Google flagging & removal requests
  • Reputation counter-strategy
  • Positive review acceleration
🛡️
Cyber Hygiene Audit

You haven't been attacked yet — but you want to lock down your digital life before something happens.

  • Full digital exposure scan
  • Password & account security check
  • Privacy settings audit
  • Prevention plan
The Process

What Happens When
You Contact Us

01
You Reach Out

Via the Connect form or WhatsApp directly. Tell us what's happening — brief is fine.

02
Same-Day Response

We respond within hours. Critical threats get immediate attention — no waiting queue.

03
Scoped & Quoted

We assess the situation, explain what's possible, and give you a clear scope and price.

04
We Get to Work

Takedowns, reports, recovery, and protection — handled confidentially from start to finish.

Pricing
From R1,500
Consultation · Scoped per situation · Same-day response

Every situation is different. We scope the work honestly and charge accordingly. Not sure where to start? Book the Free Audit and we'll point you in the right direction.

Results vary per situation. Search Playbook provides guidance and optimisation services — outcomes depend on platform cooperation and individual circumstances. By engaging our services you agree to our Terms of Service and Privacy Policy.

Pages

Pages

Page List

Pages

Pages