Surprise: We just doubled the intelligence in the room for tomorrow. Your CEO just called. The voice is perfect. They mention your kid’s soccer game. They need a "quick favor" with a wire transfer. It’s a deepfake. And your "Human Firewall" just failed. Tomorrow at 1:30 PM ET, former FBI operative Eric O'Neill was set to deconstruct how attackers use your PII to "program" these deceptions. But we have a last-minute update. To give you the full 360-degree perspective on defense, we’re bringing veteran security strategist Rick McElroy to join us as a surprise guest. Eric brings the FBI tradecraft (the attacker’s view). Rick brings the CISO strategy (the defender’s roadmap). This is a 100% Live Tactical AMA. No slides. No fluff. Stop being the training data for your own breach. Join the briefing tomorrow. Bring your hardest questions. Eric and Rick will answer them live. 👇 Registration link in the first comment.
DeleteMe
Desarrollo de software
Boston, MA 30.440 seguidores
Your Personal Data is Yours Again.
Sobre nosotros
Your personal information is available for public consumption. This makes you–and the organization you work for–an easy target for abuses ranging from identity theft, robocalls, and spam texts to social engineering, and executive and employee threats. DeleteMe removes unwanted instances of personal information from online sources; making it simple for our customers to keep their personal data from being used and abused by others. With over 100 Million individual pieces of data successfully removed since 2010, DeleteMe is the category-defining market leader in the personal data removal space.
- Sitio web
-
https://joindeleteme.com/scan
Enlace externo para DeleteMe
- Sector
- Desarrollo de software
- Tamaño de la empresa
- De 201 a 500 empleados
- Sede
- Boston, MA
- Tipo
- De financiación privada
- Fundación
- 2010
- Especialidades
- Internet privacy software, Browser add-ons, extensions, Tracker blocking, Privacy protection and management, privacy, online privacy y internet privacy
Ubicaciones
-
Principal
Cómo llegar
1 Marina Park Dr
Suite 1410
Boston, MA 02210, US
-
Cómo llegar
Cra 33 #7a-60
El Poblado
Medellin, Antioquia 050001, CO
-
Cómo llegar
No. 30, Pride Quadra, 3rd Floor
Bellary Road, Hebbal
Bangalore, Karnataka 560024, IN
Empleados en DeleteMe
Actualizaciones
-
Inbox-first security isn't enough. While email filters and employee training serve a purpose, they only activate after an attacker has already built a perfect profile of your target. When a message aligns perfectly with real-world context, traditional security signals fail. Control the information that makes these threats viable in the first place. Move your defense beyond the inbox and manage the data exposure that sits outside your corporate systems. Learn more: joindeleteme.com/business #CISO #CyberResilience #PhishingDefense #SpearPhishing
-
Most security teams defend the tail end of the spearphishing attack chain. By then, the outcome is often already decided. An attacker typically follows this path: 1. Target selection 2. Data collection and profile building 3. Attack design 4. Delivery 5. Exploitation Stage 2 is where you win or lose. Bad actors use data brokers and public records to run background checks on your employees and develop personalized lures. If your team is easy to find, they are easy to target. Effective spear phishing prevention must start with data governance to stop attackers before they ever hit "send." Read the full breakdown: https://lnkd.in/gztaSx3R #CyberSecurity #SpearPhishing #DataPrivacy #InfoSec #DataGovernance
-
DeleteMe ha compartido esto
Last day at BSidesLuxembourg and we’re starting out with a talk about privacy. Ever wonder how companies seem to know things about you? Track down your phone number? Possibly use this information for malicious purposes such as highly personalized phishing campaigns? As Glen would say:”read the privacy policy - you will either fall asleep or never sleep again” Glen Sorensen DeleteMe
-
-
The number one way fraud succeeds? Social engineering. Scammers manipulate people into sharing details or taking actions they usually wouldn't. With a little research and exposed personal info, they can impersonate authorities or create fake emergencies to cloud your judgment. Hear author, international speaker, and fraud expert Becky Holmes discuss the anatomy of social engineering and how to stay safe in the latest episode of What the Hack: https://bit.ly/3QS1UWD #SocialEngineering #Cybersecurity #OnlineSafety #DataPrivacy
-
Happy World Password Day! 🔐 Today, you'll see a lot of "hacklore" out there—outdated security advice that does little to keep you safe. For example, you've been told to change passwords every 30 days, but cybersec experts like Bob Lord explain that often leads to weaker passwords. Take a step back from hacklore. The bottom line? Longer = better. Get a password manager. Turn on Multi-Factor Authentication (MFA). These simple steps protect you against most account takeovers and typical hacks. #WorldPassword Day #CyberSecurity #OnlineSafety #PrivacyTips #StopHacklore
-
-
When you receive a message that makes you feel panicky or desperate, it’s easy to react without thinking. Fraud expert, author, and international speaker Becky Holmes shares her #1 rule for online safety on the latest episode of What the Hack: Nothing needs to be done in five minutes. Take just a few moments to step back and think logically whenever you receive an urgent message. It can save your accounts and your bottom line. Learn more about fraud, the future of trust, and how to stay safe: https://bit.ly/3QS1UWD #CyberSecurity #FraudPrevention #WhatTheHack #OnlineSafety
-
From impersonation scams to romance fraud and fake investment schemes, fraud makes us question everything around us. In this episode of "What the Hack," author, international speaker, and fraud expert Becky Holmes joined Beau Friedlander to discuss how fraud landscape has destroyed trust between humans, organizations, and the state. Tune in to explore the future of fraud and how we can start to rebuild: https://bit.ly/3QS1UWD #DigitalTrust #WhatTheHack #SocialImpact #FraudAwareness
-
To a cybercriminal, your employees may be the most accessible entry points into your network. 🛡️ Companies pour resources into hardening systems while leaving the people who run them exposed. Bad actors target employees enterprise-wide with vishing, social engineering, and email-based phishing using personally Identifiable Information (PII) found on the open web. When you remove employee PII from data broker sites, you shrink your attack surface. People security is system security. See how we track down exposed data: 👉 joindeleteme.com/business #CISO #InfoSec #CyberSecurity #EmployeeWellness #DataPrivacy #SocialEngineering
-
-
On World Press Freedom Day, we honor journalists who — as photographer Chris Anderson puts it — accept daily hazards as “part of the territory” to keep us informed. Here are a few ways they can stay safer online and in the real world. - Find out which sketchy sites are sharing your personal details, like your home address or phone number and scrub that info. Start here: joindeleteme.com/scan. - Use a hardware security key (like YubiKey) for two-factor authentication to secure accounts. - Use a VPN to conceal your location, set your social media to private, and check your app settings. - Set up a P.O. box, masked email, and masked phone number for deliveries and sign ups to prevent further leakage. We see you, and we support your right to work safely. #WorldPressFreedomDay #ProtectJournalists #PressFreedom #DigitalSecurity