David Derigiotis February 27, 2023 5 min read

How to Shrink Your Digital Footprint

Digital Footprint

October is National Cybersecurity Awareness Month which provides a great opportunity to revisit your digital footprint and evaluate where improvements can be made. Cyber insurance continues to be one of the fastest growing segments of specialty insurance, and for good reason: the threats to businesses and individuals are ever evolving and growing year over year

The number one complaint by volume as documented by the most recent FBI Internet Crime report was phishing with a whopping total of 323,972 reported cases. Phishing is used to target individuals and businesses in an effort to steal employee credentials, financial information, and carry out business email compromise attacks which netted scammers nearly $2.4 billion last year. This figure grew by more than 30% over the prior year and comes as no surprise when you consider how much of our lives are spent online both for business and pleasure. 

The Numbers

There are more than 5.4 billion internet users across the world and this number continues to grow with every moment. The following are snapshots of what happens every second of the day online: 

  • 3,195,308 emails are sent 
  • 10,244 Tweets are sent
  • 106,604 Google searches are made
  • 98,050 YouTube videos are viewed

The number of websites compromised this year has exceeded 74 million and the ransomware epidemic has surpassed $20 billion in damages when considering business interruption losses, remediation, and extortion payments experienced by organizations worldwide. 

While Embroker offers specialized cyber insurance coverage which can help clients navigate a cyber security incident, there are steps every individual can take to reduce digital risk and more specifically, social engineering attacks which are a leading cause of unauthorized access to sensitive company information, systems, and more.

Hands exiting computer monitor with lock symbol on display, hands are holding key but awaiting monetary profit to symbolize ransomware attack

The average cost of a single ransomware attack is $1.85 million.

Get a free quote today to learn how much a cyber insurance policy could save you.

Find a Policy

How to Reduce Your Personal Digital Footprint

One important step is removing personal information from data aggregation sites that can be used by scammers to obtain valuable information. The methods behind social engineering attacks can vary from gaining trust with a target, to promises of money and prizes or invoking fear and a sense of urgency when impersonating law enforcement, C-suite executives and government officials. Trust can be established when an attacker knows certain details about a target such as the names of family members and friends, place of residence, work history, personal phone number, email address, and more. This kind of personal information is collected in bulk from countless people-data sites and aggregated for anyone to access. 

Use the following guide to navigate through the data removal process. Reducing your digital footprint and offering less social engineering fuel will be a step in the right direction for achieving greater protection this Cybersecurity Awareness Month and in the years to come. 

Data Aggregators: Information Removal/Opt-Out Guide

Digital Footprint

In an effort to preserve your privacy while removing your content from these data collection sites, it is recommended you consider taking the following steps:

When removing your personal  information from the following websites, consider creating an

anonymous email address (ex. Contactme313@) or set up an account with an email forwarding service   to use for this purpose.

  • The following email service providers offer users a greater sense of privacy:

These two email providers offer a secure email service with built-in end to end encryption. With end to end encryption, content within the email is not accessible by the company itself when emailing within the network (ex. ProtonMail to ProtonMail user). Only the communicating users can read the content.

  • The following email forwarding services will allow you hide your true email address with any site you register: 

Data removal process note: This list is not exhaustive but will provide a good start for reducing your digital footprint. Many of these sites may require your follow up before successful data removal occurs. Please be sure to record the date you initially contact the service and document once removal is verified. Be diligent. 

Here’s a list of websites where you can find your personal information listed, easily accessible, and right under your nose. These websites include the ability to have your information removed. To protect yourself, your business, and your staff, it’s in your best interest to do so.

Data Aggregation Sites

Digital Footprint Sites

Cyber Background Checks:

Thatsthem:

Spokeo:

Neighbor Report:

Intelius:

Beenverified:

Peoplefinders:

True People Search:

People Search Now:

Mylife:

FamilyTreeNow:

Nuwber:

Spydialer: (This service provides users the ability to extract the outgoing cellphone message you leave for missed calls).

Whitepages:

Truthfinder:

Peekyou:

Instantcheckmate:

My Relatives:

Instant People Finder:

Acxiom:

Lexis Nexis:

Cubib:

Fast People Search:

PrivateEye:

People Whiz:

People by Name:

For learn more resources and tools to help protect yourself or your business, check out Embroker’s blog here. If you’re ready to secure your future, learn more about Embroker’s Cyber Liability Insurance here.

David Derigiotis, CIO

David Derigiotis

David serves as the Chief Insurance Officer for leading insurtech, Embroker. In this role, David is responsible for providing the strategic direction and leadership for the performance of Embroker’s insurance operations which include underwriting, claims, and other functions. David is an active member of the International Association of Privacy Professionals (IAPP) and holds designations as a Certified Information Privacy Professional (CIPP/US), a Certified Information Privacy Manager (CIPM) and is a Fellow of Information Privacy (FIP).

Related Articles

A lawyer is holding a figurine of a courthouse. As we examine the biggest cyber threats to law firms in this article, it's interesting to think about, while physical presence is so important in law, the digital world poses a major threat.
The Biggest Cyber Threats to Law Firms

The Biggest Cyber Threats to Law Firms

5 min read

Risk is all around us. There’s the extreme physical kind, including earthquakes and sidewalk punchers. Then there are digital risks, like hackers who target individuals and businesses alike. That’s part of the reason why keeping track of the biggest cyber threats to law firms is so important. Law firms are increasingly targeted by cybercriminals due […]

Read More
A lawyer stands holding a folder with a scale on it, indicating that they are holding a law firm cyber attack response plan.
Law Firm Cyber Attack Response Plan

Law Firm Cyber Attack Response Plan

7 min read

As a lawyer, your clients trust you with their most confidential information, making you a prime target for cybercriminals who are increasingly targeting law firms. But, do you have a law firm cyber attack response plan? While we hate to be the bearers of bad news, there’s a good chance you’ll experience a cyber incident […]

Read More