Skip to main content

Resources

Trends in business privacy regulation, cyber and physical security, and related emerging technology.

February 3, 2023
How does personal information removal from online sources help companies protect themselves against hackers? To answer this question, DeleteMe’s CEO Rob Shavell sat down with the ethical hacker Rachel Tobac in a recent webinar.  The full recorded version of this webinar is available for down…
January 23, 2023
LastPass, NortonLifelock Services Compromised LastPass, one of the largest commercial password-manager services, announced a data breach incident in late 2022, acknowledging that the exposed data included backups of customer vault information, which includes usernames/passwords and automated form…
January 6, 2023
Global conflicts, financial crises, critical infrastructure attacks, politics and elections, major legal rulings, job market fluctuations, and health crises can all have a major impact on an organization’s security.  Doxxing and harassment, social engineering, and ransomware attacks increase with…
December 27, 2022
Read the December 2022 issue of our business privacy newsletter.
December 20, 2022
Each year we look at the trends in business privacy regulation, cybersecurity, technology, and personal data-driven business risks (which range from social engineering to doxxing). Then we take out our crystal ball and attempt to predict what will happen for: In the past two ‘pandemic period’ yea…
November 29, 2022
Read the November 2022 issue of our business privacy newsletter.
November 3, 2022
Cybercriminals use automated tools to find and exploit weak and reused employee credentials and break into corporate accounts and networks. Most employees’ passwords are easy to guess or brute force through automated credential-stuffing processes. This is because they tend to include or derive fr…
October 26, 2022
In the Oct 2022 edition of our business privacy newsletter, you’ll find our take on: a new Executive Order, Russian ransomware gangs & malicious social account takeovers.
October 21, 2022
Reconnaissance is where most cyber attacks start. Open-source intelligence (OSINT) is a powerful, free, and common way for cybercriminals to conduct reconnaissance. In a 2021 interview with the YouTube channel Russian OSINT, a member of the ransomware group LockBit 2.0 alluded to using OSINT tool…
October 3, 2022
When personal data is out there on the open web it can lead to privacy and security incidents at work that open you—and your company—up to risk. For cybersecurity awareness month, we’re offering tips on rebooting your privacy at work. Video Meetings  Smartphones  Email Safety  Gen…

How does DeleteMe privacy protection work?

  1. Employees, Executives, and Board Members complete a quick signup 
  2. DeleteMe scans for exposed personal information
  3. Opt-out and removal requests begin
  4. Initial privacy report shared and ongoing reporting initiated
  5. DeleteMe provides continuous privacy protection and service all year

    Your employees’ personal data is on the web for the taking.

    DeleteMe is built for organizations that want to decrease their risk from vulnerabilities ranging from executive threats to cybersecurity risks.