📩 Building trust takes time - spamming for sales breaks it instantly. On the latest episode of "What the Hack?" Seth Godin shares what too many brands forget: Brands need to earn permission and protect trust. And spam won't help you build relationships. Listen to Seth tell the story of how PS Audio built a multimillion-dollar business without spamming. This is the kind of long-term thinking more companies need to embrace. 🎧 Listen to the full episode here: https://lnkd.in/e9SZ_HiA #DataPrivacy #EmailMarketing #DigitalTrust #WhatTheHackPodcast #Cybersecurity #BrandLoyalty
DeleteMe
Software Development
Boston, MA 25,929 followers
Your Personal Data is Yours Again.
About us
Your personal information is available for public consumption. This makes you–and the organization you work for–an easy target for abuses ranging from identity theft, robocalls, and spam texts to social engineering, and executive and employee threats. DeleteMe removes unwanted instances of personal information from online sources; making it simple for our customers to keep their personal data from being used and abused by others. With over 100 Million individual pieces of data successfully removed since 2010, DeleteMe is the category-defining market leader in the personal data removal space.
- Website
-
https://joindeleteme.com
External link for DeleteMe
- Industry
- Software Development
- Company size
- 201-500 employees
- Headquarters
- Boston, MA
- Type
- Privately Held
- Founded
- 2010
- Specialties
- Internet privacy software, Browser add-ons, extensions, Tracker blocking, Privacy protection and management, privacy, online privacy, and internet privacy
Locations
-
Primary
Get directions
1 Marina Park Dr
Suite 1410
Boston, MA 02210, US
-
Get directions
Cra 33 #7a-60
El Poblado
Medellin, Antioquia 050001, CO
-
Get directions
No. 30, Pride Quadra, 3rd Floor
Bellary Road, Hebbal
Bangalore, Karnataka 560024, IN
Employees at DeleteMe
-
Bill Burnham
Managing General Partner at Inductive Capital
-
Finn Faldi
DeleteMe; Senior Advisor Appex; Senior Advisor ESG Luxury; 2 X Public Company Officer; Over $15 Billion in Value Creation Exits; Investor in 15+ Tier…
-
Steve Orenberg
Leading and Growing Tech Companies
-
Ed Jackowiak
Updates
-
Exposed personal data is a national security risk. From property records to brokered personal info, government officials face growing exposure, not just online, but in real life. Such tactics as doxxing, targeted harassment, and swatting go beyond cybersecurity threats to create real physical safety threats. And too often, attackers start with data that’s easy to find and legally available. Proactive data removal must become a priority to protect public servants. #GovernmentSecurity #DataPrivacy #NationalSecurity #DeleteMe #PublicSector #CyberSafety
-
-
Your employees are being doxxed right now. (And it's completely legal.) Brokers scrape personal details like addresses, phone numbers, relatives, political affiliation, even court records, and sell that information to anyone. That creates serious risks for your workforce: phishing, harassment, scams, and even swatting. In a new Cybernews interview, our CEO Rob Shavell breaks down how unchecked data brokerage has become a gateway for cybercrime, and why businesses need to take it seriously. Keeping your business safe means keeping your people safe. Start by protecting their personal data. #EmployeeSafety #DataPrivacy #Cybersecurity #DataBrokers #B2B #DeleteMe
-
-
DeleteMe reposted this
My thoughts on..."The Scarcity Trap: Where Scammer and Scammed Collide”. A conversation between Beau Friedlander (Head of Content at DeleteMe) and Gary Warner (Director of Threat Intelligence at DarkTower). 🤔 🤔 🤔 This discussion challenges the common idea that cybercrime is driven by greed alone. Instead, it highlights a deeper scarcity: scarcity of money, opportunity, connection, and belonging. Scammers often act out of desperate financial need. Victims get caught because they are lonely or feel unfulfilled. Both groups are chasing the same missing piece, which is a sobering reality. This insight shifts the conversation away from purely technological solutions. When "education outpaces opportunities" and loneliness outpaces communities, cybercrime has the space to thrive. I reflected on this with my colleague Matt Rose. Ethical hackers, he said, have created a community based on abundance, even in a digital world full of scarcity. They share knowledge, collaborate, and trust that security improves through openness. Where scammers hoard their secrets and isolate, ethical hackers connect and share openly. It makes me wonder if what unethical hackers really lack is a real sense of belonging and purpose. The lesson for all of us is that while better security is CRITICAL, another very real solution involves building communities where people feel valued and connected. Thank you to DeleteMe, Beau Friedlander, and Gary Warner for sparking this conversation! Link in comments. #Cybersecurity | #EthicalHacking | #Community | #DigitalTrust | #Cybercrime | Harry Baldwin | Callum Davis | Tom Wilding
-
1.7%. That's how much phishing training improves recognition and reduces security incidents. At Black Hat 2025, UC San Diego researchers presented one of the largest real-world studies on phishing training to date. The takeaway? Training alone isn’t enough. Reducing your attack surface makes a bigger difference. The less personal and professional information about your workforce is exposed online, the fewer details attackers have to craft convincing phishing campaigns. Training has its place, but protecting employee data limits how effective those attacks can be. Learn more at https://lnkd.in/e5W7vbVw #Cybersecurity #DataPrivacy #Phishing #ExecutiveProtection
-
-
🎙️ Deepfakes are not just another cybersecurity threat. They target the foundation of every business interaction: trust. In this new piece from The Cybersecurity Law Report, Rob Shavell, co-founder of DeleteMe, joins experts from Gartner, Baker Donelson, and Fisher Phillips to outline what a real deepfake defense program should look like. AI detection tools are evolving, but as we've pointed out in the past, companies also need to reduce the personal data that fuels impersonation attacks and other threats. Without that data, deepfake campaigns lose their power. Read the full article here: https://lnkd.in/ey6b5AQh #Cybersecurity #Deepfakes #Privacy #DeleteMe #DataProtection
-
Arizona’s Proposition 211, the Voters’ Right to Know Act, is under review in the state Supreme Court. It would force nonprofits that speak out on elections to publicly disclose their donors. Supporters frame it as a fight against “dark money.” But in practice, it would publish names, home addresses, and employers in a searchable database - a serious risk in today’s polarized climate. That risk grows when paired with what’s already online. Data brokers make personal details like addresses and phone numbers easy to find, giving bad actors more tools to harass or intimidate nonprofit leaders, staff, and supporters. For non-profits, reducing exposed data helps protect executives, employees, and donors from becoming targets. #DataPrivacy #Cybersecurity #Nonprofits #ExecutiveProtection
-
-
(╯°□°)╯︵ ┻━┻
Companies sell privacy. Companies steal privacy. Privacy is a talking point. But is your digital life private? Who can you trust? A new investigation into the Universe Browser delivers a chilling answer: The greatest threat to your digital life is software that acts like a legitimate application while harboring features similar to full-blown malware. (╯°□°)╯︵ ┻━┻ Wired’s reporting reveals that the Universe Browser campaign, tied to vast illicit gambling networks, contains elements that mimic classic malicious functions: --Similarity to Key Logging: The software contains components whose functionality is described as similar to key logging, meaning it may be able to track user inputs, compromising sensitive data like passwords and financial details. --Surreptitious Connections: It is designed to make unauthorized, hidden connections, constantly siphoning data back to command-and-control servers for continuous data exfiltration. --Network Manipulation: Researchers found its capabilities include changing a device’s network connections, suggesting it can control or reroute traffic to bypass local security and maintain persistence. Nuance is the Danger The technical distinction between a "malicious browser feature" and "true malware" is rapidly disappearing. When software exhibits functions for covert data tracking, network hijacking, and unauthorized connections—even if the delivery method is a browser—it represents a system compromise. While this seeming Trojan browser is mainly distributed through casino sites targeting users where gambling is illegal, it should be a heads up for all of us. The threat is increasingly inside the perimeter. Or put it another way: There is no perimeter. The takeaway? Network monitoring is sooooo Cybersecurity Awareness Month 2015. Implement strict policies on software installation. Regularly audit endpoints for signs of unauthorized processes and unexpected network configuration changes, as the line between a Trojan and a trusted application has dissolved. And look for weird extensions on your browser. Finally: Let's help each other. Friends don't let friends download sketchy whizbang. If you see something, say something. Read the full investigation to understand the scope of the threat: https://lnkd.in/eE92nD2y #Cybersecurity #Privacy #Malware #Infosec #DataProtection #BrowserSecurity
-
DeleteMe reposted this
🛑 It's Cybersecurity Awareness Month. Don't be so predictable! Your phone isn't just a communication tool; it's a digital witness constantly recording your "pattern of life." This predictable data trail is useful to scammers, marketers, and data brokers alike. As digital forensics expert Heather Barnhart (SANS Institute, Cellebrite) shared on the "What the Hack?" podcast this week, predictability can mean vulnerability. Even turning your phone off at a critical time can be damning, a key fact Barnhart discovered in her forensics work on Bryan Kohberger's quadruple murder case in Idaho. Want out of that ecosystem? Here are three low-effort, high-impact steps to break your pattern: --Log In & Purge: Delete all old, unused devices from your Google/Apple accounts. --MFA is a Must: Turn on Multi-Factor Authentication for everything sensitive. Establish a Safe Word: Use a family safe word to defeat AI Deep-Fake voice and video scams. --And the simplest act of rebellion: Stop being the star of your own private version of "The Truman Show." Turn your phone off periodically. Here's my take on this week's episode. https://lnkd.in/e3FF3ENa #Cybersecurity #Privacy #DataSecurity #DigitalHygiene
-
When attackers target executives or public figures, the schemes often get personal. In a recent episode of the What the Hack? podcast, filmmaker Dan Sturman described how spoofed calls and threatening messages pulled him - and even his family - into a social engineering scam. The takeaway is clear: personal details online can be weaponized against your leadership team. Protecting executives isn’t just about technical defenses. It’s also about shrinking their digital footprint. Less exposed data means fewer ways for criminals to get in. 🎧 Listen to the full episode here: https://lnkd.in/ezJuGYFz #Cybersecurity #DataPrivacy #ExecutiveProtection #FraudPrevention