1.7%. That's how much phishing training improves recognition and reduces security incidents. At Black Hat 2025, UC San Diego researchers presented one of the largest real-world studies on phishing training to date. The takeaway? Training alone isn’t enough. Reducing your attack surface makes a bigger difference. The less personal and professional information about your workforce is exposed online, the fewer details attackers have to craft convincing phishing campaigns. Training has its place, but protecting employee data limits how effective those attacks can be. Learn more at https://lnkd.in/e5W7vbVw #Cybersecurity #DataPrivacy #Phishing #ExecutiveProtection
DeleteMe
Software Development
Boston, MA 25,731 followers
Your Personal Data is Yours Again.
About us
Your personal information is available for public consumption. This makes you–and the organization you work for–an easy target for abuses ranging from identity theft, robocalls, and spam texts to social engineering, and executive and employee threats. DeleteMe removes unwanted instances of personal information from online sources; making it simple for our customers to keep their personal data from being used and abused by others. With over 100 Million individual pieces of data successfully removed since 2010, DeleteMe is the category-defining market leader in the personal data removal space.
- Website
 - 
        
                  
    
      https://joindeleteme.com
      
    
  
                  
External link for DeleteMe
 - Industry
 - Software Development
 - Company size
 - 201-500 employees
 - Headquarters
 - Boston, MA
 - Type
 - Privately Held
 - Founded
 - 2010
 - Specialties
 - Internet privacy software, Browser add-ons, extensions, Tracker blocking, Privacy protection and management, privacy, online privacy, and internet privacy
 
Locations
- 
                  
                    Primary
                  
                Get directions
1 Marina Park Dr
Suite 1410
Boston, MA 02210, US
 - 
                Get directions
Cra 33 #7a-60
El Poblado
Medellin, Antioquia 050001, CO
 - 
                Get directions
No. 30, Pride Quadra, 3rd Floor
Bellary Road, Hebbal
Bangalore, Karnataka 560024, IN
 
Employees at DeleteMe
- 
              
    
    
    
    
    
      
        
      
          
      
Bill Burnham
Managing General Partner at Inductive Capital
 - 
              
    
    
    
    
    
      
        
      
          
      
Finn Faldi
DeleteMe; Senior Advisor Appex; Senior Advisor ESG Luxury; 2 X Public Company Officer; Over $15 Billion in Value Creation Exits; Investor in 15+ Tier…
 - 
              
    
    
    
    
    
      
        
      
          
      
Steve Orenberg
Leading and Growing Tech Companies
 - 
              
    
    
    
    
    
      
        
      
          
      
Ed Jackowiak
 
Updates
- 
              
        
    
🎙️ Deepfakes are not just another cybersecurity threat. They target the foundation of every business interaction: trust. In this new piece from The Cybersecurity Law Report, Rob Shavell, co-founder of DeleteMe, joins experts from Gartner, Baker Donelson, and Fisher Phillips to outline what a real deepfake defense program should look like. AI detection tools are evolving, but as we've pointed out in the past, companies also need to reduce the personal data that fuels impersonation attacks and other threats. Without that data, deepfake campaigns lose their power. Read the full article here: https://lnkd.in/ey6b5AQh #Cybersecurity #Deepfakes #Privacy #DeleteMe #DataProtection
 - 
              
        
    
Arizona’s Proposition 211, the Voters’ Right to Know Act, is under review in the state Supreme Court. It would force nonprofits that speak out on elections to publicly disclose their donors. Supporters frame it as a fight against “dark money.” But in practice, it would publish names, home addresses, and employers in a searchable database - a serious risk in today’s polarized climate. That risk grows when paired with what’s already online. Data brokers make personal details like addresses and phone numbers easy to find, giving bad actors more tools to harass or intimidate nonprofit leaders, staff, and supporters. For non-profits, reducing exposed data helps protect executives, employees, and donors from becoming targets. #DataPrivacy #Cybersecurity #Nonprofits #ExecutiveProtection
 - 
                  
 - 
              
        
    
(╯°□°)╯︵ ┻━┻
Companies sell privacy. Companies steal privacy. Privacy is a talking point. But is your digital life private? Who can you trust? A new investigation into the Universe Browser delivers a chilling answer: The greatest threat to your digital life is software that acts like a legitimate application while harboring features similar to full-blown malware. (╯°□°)╯︵ ┻━┻ Wired’s reporting reveals that the Universe Browser campaign, tied to vast illicit gambling networks, contains elements that mimic classic malicious functions: --Similarity to Key Logging: The software contains components whose functionality is described as similar to key logging, meaning it may be able to track user inputs, compromising sensitive data like passwords and financial details. --Surreptitious Connections: It is designed to make unauthorized, hidden connections, constantly siphoning data back to command-and-control servers for continuous data exfiltration. --Network Manipulation: Researchers found its capabilities include changing a device’s network connections, suggesting it can control or reroute traffic to bypass local security and maintain persistence. Nuance is the Danger The technical distinction between a "malicious browser feature" and "true malware" is rapidly disappearing. When software exhibits functions for covert data tracking, network hijacking, and unauthorized connections—even if the delivery method is a browser—it represents a system compromise. While this seeming Trojan browser is mainly distributed through casino sites targeting users where gambling is illegal, it should be a heads up for all of us. The threat is increasingly inside the perimeter. Or put it another way: There is no perimeter. The takeaway? Network monitoring is sooooo Cybersecurity Awareness Month 2015. Implement strict policies on software installation. Regularly audit endpoints for signs of unauthorized processes and unexpected network configuration changes, as the line between a Trojan and a trusted application has dissolved. And look for weird extensions on your browser. Finally: Let's help each other. Friends don't let friends download sketchy whizbang. If you see something, say something. Read the full investigation to understand the scope of the threat: https://lnkd.in/eE92nD2y #Cybersecurity #Privacy #Malware #Infosec #DataProtection #BrowserSecurity
 - 
              
        
    
DeleteMe reposted this
🛑 It's Cybersecurity Awareness Month. Don't be so predictable! Your phone isn't just a communication tool; it's a digital witness constantly recording your "pattern of life." This predictable data trail is useful to scammers, marketers, and data brokers alike. As digital forensics expert Heather Barnhart (SANS Institute, Cellebrite) shared on the "What the Hack?" podcast this week, predictability can mean vulnerability. Even turning your phone off at a critical time can be damning, a key fact Barnhart discovered in her forensics work on Bryan Kohberger's quadruple murder case in Idaho. Want out of that ecosystem? Here are three low-effort, high-impact steps to break your pattern: --Log In & Purge: Delete all old, unused devices from your Google/Apple accounts. --MFA is a Must: Turn on Multi-Factor Authentication for everything sensitive. Establish a Safe Word: Use a family safe word to defeat AI Deep-Fake voice and video scams. --And the simplest act of rebellion: Stop being the star of your own private version of "The Truman Show." Turn your phone off periodically. Here's my take on this week's episode. https://lnkd.in/e3FF3ENa #Cybersecurity #Privacy #DataSecurity #DigitalHygiene
 - 
              
        
    
When attackers target executives or public figures, the schemes often get personal. In a recent episode of the What the Hack? podcast, filmmaker Dan Sturman described how spoofed calls and threatening messages pulled him - and even his family - into a social engineering scam. The takeaway is clear: personal details online can be weaponized against your leadership team. Protecting executives isn’t just about technical defenses. It’s also about shrinking their digital footprint. Less exposed data means fewer ways for criminals to get in. 🎧 Listen to the full episode here: https://lnkd.in/ezJuGYFz #Cybersecurity #DataPrivacy #ExecutiveProtection #FraudPrevention
 - 
              
        
    
With AI-driven tools, hackers can leverage personal data faster than ever before. Are you prepared? At DeleteMe, we’ve seen how hackers are turning your team’s personal info into an attack surface. On October 24, join our webinar to learn exactly how these data leaks fuel modern attacks, and what you can do to fight back. Our panel of Rachel Tobac from SocialProof Security, Victor Wieczorek from GuidePoint Security, and our own Glen Sorensen and Beau Friedlander will be diving into topics like: Uncovering attacker tactics: See how personal data is weaponized in phishing, impersonation, and insider attacks. Understand the stack fit: Learn how personal data removal integrates into MITRE ATT&CK, NIST CSF, and your security program. Take actionable steps: Move from awareness to action with practical strategies for data removal, employee education, and risk reduction. ⬇️ Find the reg link in the comments here and we hope to see you there live! #Cybersecurity #Infosec #PrivacyProtection
 - 
                  
 - 
              
        
    
📊 Gartner reports that 62 percent of organizations faced a deepfake attack in the past year, and nearly a third saw attacks on GenAI apps. These scams work because AI feeds on personal data. With enough details, attackers can mimic a CFO’s voice, a CEO’s image, or craft emails that trick employees into giving up sensitive information. The more data available, the more convincing - and dangerous - the attack. Deepfakes thrive on the same data-broker ecosystem behind robocalls, spam, and identity theft. Strong cybersecurity matters, but so does shrinking the pool of available employee data that fuels these scams. #Cybersecurity #Deepfakes #DataPrivacy #FraudPrevention
 - 
                  
 - 
              
        
    
Something to keep in mind this National Cybersecurity Awareness Month: Job-related scams aren’t just a problem for job seekers — they’re a growing risk for businesses like yours. When scammers impersonate recruiters, they trick candidates into handing over money or sensitive details such as Social Security numbers and bank information. The damage doesn’t stop there — these scams tarnish your brand, erode trust, and create openings for broader fraud. Much of this activity is fueled by data brokers. Publicly available employee details give scammers the material to build convincing profiles. Limiting that exposure makes it harder for fraudsters to weaponize your company’s name. #Cybersecurity #FraudPrevention #DataPrivacy #Hiring
 -