Skip to main content

Resources

Trends in business privacy regulation, cyber and physical security, and related emerging technology.

November 3, 2022
Most Employees Use Easily Findable Personal Information As Their PasswordsSecurity Questions and Answers Are Also a RiskMFA Is Not Foolproof Against Automated OSINTFive Tips for OSINT Protection  Cybercriminals use automated tools to find and …
October 26, 2022
Under New Executive Order, Europeans Can Complain to the U.S. About Data CollectionOur TakeAirports, Hospitals, and Schools are Targeted by Ransomware Gangs Connected to Russia Our TakeMalicious Social Account Takeover EpidemicOur TakeDeleteMe In…
October 21, 2022
What is OSINT?Trial and ErrorHow Data Brokers Make OSINT EasierManaging Your Organization’s OSINT Footprint  Reconnaissance is where most cyber attacks start. Open-source intelligence (OSINT) is a powerful, free, and common way for cybercrimin…
October 3, 2022
When personal data is out there on the open web it can lead to privacy and security incidents at work that open you—and your company—up to risk. For cybersecurity awareness month, we’re offering tips on rebooting your privacy at work. Video Me…
September 28, 2022
CA Governor Signs ‘Age-Appropriate Design Code Act’ (ADCA) Into LawOur TakeUber Joins Ranks of Businesses Compromised by Targeting Employee PII and Personal DevicesOur TakeLocation Data Brokers Increasingly Under Fire by Congress and Regulatory A…
September 22, 2022
Employee PII Exposure + Weak MFA Driving Major BreachesThree Takeaway Lessons from the Uber Breach On the 15th of September, 2022, Uber announced that it was hacked. Speaking to The New York Times, Sam Curry, a software security engineer a…
September 13, 2022
Remote Work Highlights Human Attack VectorsAs a Result, Professional OPSEC Is Becoming More Important Employees Still Behave As If They Are Working In an OfficeSurface Web PII Is Also a ThreatEvery Organization Needs a Professional OPSEC PolicyId…
August 31, 2022
What Are Privacy Protection Programs?What Are Identity Protection Programs?Key Differences Between Enterprise-Level SolutionsAt a Glance:Privacy Protection vs. Other People-Protective Solutions  An employee’s home address, phone number, date o…
August 29, 2022
Regulatory Roundup: Interest Groups Take Competing Sides on ADPPA; FTC Begins Process for Privacy Rule-MakingTwilio and Cloudflare Hit by Social Engineering Attacks Using Employee and Family Member Home Phone NumbersIlluminate Education Breach Le…
July 28, 2022
In the July 2022 edition of our business privacy newsletter, you’ll find our take on: American Data Privacy and Protection ActScrutiny for Mobile Carriers and VPN ProvidersData Privacy as a Civil Rights IssuePrivacy, Security & Remote Work…

How does DeleteMe privacy protection work?

  1. Employees, Executives, and Board Members complete a quick signup 
  2. DeleteMe scans for exposed personal information
  3. Opt-out and removal requests begin
  4. Initial privacy report shared and ongoing reporting initiated
  5. DeleteMe provides continuous privacy protection and service all year

    Your employees’ personal data is on the web for the taking.

    DeleteMe is built for organizations that want to decrease their risk from vulnerabilities ranging from executive threats to cybersecurity risks.