Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Simple steps to erase your digital footprint

9 of 11 NEXT PREV
  • Google yourself

    Google yourself

    The Google search engine can be used to uncover exactly what information about you is public and what the average person can find out.

    Once you know what is out there in the internet space, you can start tackling the problem. Run a quick search and make notes.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Have I Been Pwned

    Have I Been Pwned

    You cannot take control of your digital footprint without knowing where and what information is available and what data may have potentially leaked.

    The HaveIBeenPwned service is run by cybersecurity expert Troy Hunt and is a useful tool in discovering account information belonging to you which may have been compromised or stolen due to a data breach.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Your right to be forgotten

    Your right to be forgotten

    In the EU, citizens are able to request the removal of information from the Google search engine as well as Blogger and other related Google-owned products.

    Google will not remove links if the company judges that such actions would not be in the public interest. However, it is still worth a go if search results based on your name are causing you serious consequences -- and you have a valid reason to complain.

    Access the Google search engine removal request form here. To submit a request related to other products, such as Blogger, Google Ads, or Image search, you can use the form here.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Google account restriction and deletion

    Google account restriction and deletion

    Go to the Google Account page where there are a number of settings which can boost your privacy or take you out of the ecosystem entirely.

    Privacy checkup: The Google Privacy checkup allows users to prevent Google from saving your searches and other Google activity to your account as well as turn off location history, YouTube data collection, and personalized ads.

    Security checkup: The Google Security checkup can be used to show you that devices and third-party applications have access to your account. You can remove permissions as necessary.

    Delete me: Google's deletion service can be used to delete select products or wipe your account permanently.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Quick fixes

    Quick fixes

    DeleteMe removes data including names current and past addresses, date of birth, and aliases on your behalf from platforms including people search databases.

    Unroll.me can be used to list everything you are subscribed to, making the job of unsubscribing from newsletters, company updates, and more far easier.

    Deseat.me is an automated service for requesting account removal and subscription deletion.

    Account Killer gives users a rating system which describes the complexity of account deletion processes provided by online services.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Deleting your Facebook account

    Deleting your Facebook account

    -- In the Settings tab, you can download all of the information that Facebook holds on you.

    -- In the Privacy tab, you can restrict your posts to 'friends only,' limit your past posts, and decide to disallow lookups through your provided email address or phone number. An important element which shouldn't be overlooked here is the option to also remove your Facebook profile from search engine results outside of the social networking platform.

    -- Under the Location tab, consider turning off location data collection by Facebook across your devices.

    -- Deactivation: You need to go to Settings, General, and Manage your account to deactivate your account. This gives you the option to return at a later time and does not delete your data.

    -- You can also permanently delete your account by clicking Settings, going to Your Facebook Information, and clicking Delete Your Account and Information, followed by Delete My Account.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Twitter closure and deactivation

    Twitter closure and deactivation

    Twitter also allows users to request their 'archive,' which is all the information collected from you. This option can be found under the Settings and privacy tab.

    In the settings area, you can also choose to lock down your account entirely and make tweets private and only viewable by those with your approval, you can turn off tweets containing location data, you can decide whether or not to allow email and phone number searches to connect others to your profile, and you can choose whether or not to allow others to tag you in photos.

    In order to deactivate Twitter, you need to click on Settings and privacy from the drop-down menu under your profile icon. From the Account tab, you can then click deactivate.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Instagram lock down

    Instagram lock down

    Facebook-owned Instagram has a number of privacy settings you can change to maintain an acceptable level of privacy.

    By default, anyone can view your photos and videos on your Instagram account. However, by going to your profile, clicking Settings, Account Privacy, and switching Private account on, you can make sure your content is only viewed by those you approve.

    To delete your account, log in and go to the request deletion page. Once you have submitted an answer as to why you are deleting your account, you will be prompted to re-enter your password, and then a delete account option will appear.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Remove old accounts and posts

    Remove old accounts and posts

    Unless an online account is one you use frequently, consider deleting it permanently. It is a pain to find, remember credentials, and recover passwords associated with old accounts, but this is an important step in locking down your data.

    If you have come across embarrassing forum posts or messages and you do not have the privileges required to delete, the only other option is to contact webmasters directly.

    Make sure you include a link to the content you are concerned about, give your reasons, and hope they agree to delete it.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Hide old content, accounts

    Hide old content, accounts

    If you cannot delete online accounts outright and only deactivate them, before you do, wipe as much content from them as possible. If the account is no longer relevant to you, consider changing the name and personal details connected to it, as well as remove or change any photos to generic images.

    When it comes to active accounts such as on Facebook or Twitter, aliases can help keep your digital and physical presence separate. It is against terms of service to not use your full, correct name, but it is still common practice for many to change their surname to prevent work and personal accounts from colliding.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

  • Final measures

    Final measures

    Starting from scratch may seem extreme, but in some cases, could be worth considering. The outright deletion of email accounts, social media, and e-commerce services won't immediately destroy all data or search results connected to them, but it will, over time, make them less likely to appear.

    Before you take this step, make sure you have backed up any data that you want to keep such as photos you have uploaded to social media.

    Security

    • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The biggest hacks, data breaches of 2020
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
    • How to improve the security of your public cloud (TechRepublic)
    Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

    Caption by: Charlie Osborne

9 of 11 NEXT PREV
Charlie Osborne

By Charlie Osborne | September 20, 2018 -- 12:05 GMT (05:05 PDT) | Topic: Security

  • Google yourself
  • Have I Been Pwned
  • Your right to be forgotten
  • Google account restriction and deletion
  • Quick fixes
  • Deleting your Facebook account
  • Twitter closure and deactivation
  • Instagram lock down
  • Remove old accounts and posts
  • Hide old content, accounts
  • Final measures

Need help wiping the slate clean? Here are some instructions on removing and wiping services most likely to store your data and online activities.

Read More Read Less

Remove old accounts and posts

Unless an online account is one you use frequently, consider deleting it permanently. It is a pain to find, remember credentials, and recover passwords associated with old accounts, but this is an important step in locking down your data.

If you have come across embarrassing forum posts or messages and you do not have the privileges required to delete, the only other option is to contact webmasters directly.

Make sure you include a link to the content you are concerned about, give your reasons, and hope they agree to delete it.

Security

  • Capitol attack's cybersecurity fallout: Stolen laptops, lost data and possible espionage
  • Cyber security 101: Protect your privacy from hackers, spies, and the government
  • The biggest hacks, data breaches of 2020
  • The best VPNs for business and home use
  • The best security keys for two-factor authentication
  • How ransomware could get even more disruptive in 2021 (ZDNet YouTube)
  • How to improve the security of your public cloud (TechRepublic)
Published: September 20, 2018 -- 12:05 GMT (05:05 PDT)

Caption by: Charlie Osborne

9 of 11 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | September 20, 2018 -- 12:05 GMT (05:05 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums