By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Google Introduces Project Naptime for AI-Powered Vulnerability Research
    24 June 2024
    Better Resilience Sees More Extorted Companies Refuse To Pay Their Ransomware Attackers
    28 June 2024
    OVHcloud Hit with Record 840 Million PPS DDoS Attack Using MikroTik Routers
    5 July 2024
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Manchester United vs. Brentford 2024 livestream: Watch Premier League for free
    19 October 2024
    10 Best Mobile Games for iOS and Android
    28 October 2024
    What does Trump’s election mean for EVs, Tesla, and Elon Musk?
    6 November 2024
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    US stocks record worst day in two months on rate rise worries
    21 February 2023
    Putin’s war: how and when will it end?
    23 February 2023
    Yellen says U.S. inflation coming down but core measures remain elevated By Reuters
    24 February 2023
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Ransomware Minute. Newpark Resources, California's HACLA. Scott Schober, WCYB Digital Radio.
    12 November 2024
    Cybercrime News For Nov. 20, 2024. Maxar Confirms Data Breach. WCYB Digital Radio.
    21 November 2024
    What’s Holding You Back? Cyber Security Today Weekend Special
    30 November 2024
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: How to remove yourself from the internet and from people search sites • Graham Cluley
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > How to remove yourself from the internet and from people search sites • Graham Cluley
Cyber Security

How to remove yourself from the internet and from people search sites • Graham Cluley

webmaster
Last updated: 2023/02/21 at 10:06 PM
webmaster
Share
6 Min Read
SHARE

Graham Cluley Security News is sponsored this week by the folks at Incogni. Thanks to the great team there for their support!

Cybercrimes happen much more often than you might think and affect a growing amount of people. With crimes such as identity theft and various other scams, being mindful of your digital footprint is more crucial than ever. So how can you minimize the threat?

1. Opt out from data broker sites and people search websites

Nowadays, information can be worth more than money, so no wonder the data broker industry is booming. Moreover, without any definitive federal laws regulating this business, data brokers have been known to not only collect data but also sell it. That’s why, with a growing number of data brokers and people search sites, your personal info is more vulnerable than ever.

An average people search site gives you access to a myriad of personal information, including current and past addresses, phone numbers, property records, and marital status. They collect all of these personal details from public records, court records, and other open sources. Fortunately, most also allow you to opt out.

In the case of many websites, the removal process is fairly straightforward, as you may be required only to send an opt-out request. However, others may involve an ample amount of time and patience. It can be particularly time-consuming if you decide to opt out of more people search sites.

That said, this is where data removal services can really help out. By sending automatic opt-out requests on your behalf, both to data brokers and people search sites, you can focus on spending time on more pleasant things.

2. Delete old online accounts

Over the years, you’ve surely created dozens, if not hundreds, of accounts on various websites. However, even if you haven’t logged onto your old accounts in forever, those web pages can still be sharing your personal information. What’s even worse, you may not even be aware that a data breach occurred, thus making your account information known to hackers.

Log into your email account and search for keywords that might have appeared in welcome emails (“welcome,” “account,” etc.) Once you find these emails, head to the web page where you set up your account and simply deactivate it.

Remove

3. Remove personal information from Google Search results

Thanks to Alphabet’s feature that allows you to remove private information from Google Search results, you can now influence your online data shown in the search engine. Although the process isn’t always successful, as Google has strict policies regarding data removal, it is definitely worth trying.

Just go to the removal request web page and begin the process. If you are very determined to minimize your digital footprint, you can also try to delete your personal information from other search engines.

4. Deactivate social media accounts

Social media sites, by our choice, of course, store plenty of our personal information. By sharing social media posts, we give these sites access to our data, which can later end up being sold. That is why the safest approach is to simply delete your social media accounts.

That said, if you are not ready just yet to go entirely off the grid, you can also tighten your privacy settings. This will at least minimize the number of people who can see your activities. Also, if you have time, consider going through your old social media posts and deleting them. This way, you can remove at least some of your data without entirely giving up on social media websites.

Optimise

5. Optimize your online privacy settings

Websites gather plenty of data when browsing the internet without you even realizing it. From cookies to location tracking, you are informed about the process, but you often are not aware of the aftermath. This data can later be shared and even sold, thus putting you at risk of being targeted by scammers or hackers.

What can you do? Optimize your privacy preferences. Set all accounts to private, disable ad personalization, turn off activity tracking, and reject cookies. This will cut down the amount of online data about you.

Phone email data

The takeaway

Yes, scrubbing your digital footprint is time-consuming and can even be nerve-racking. But we promise just by sending out a removal request to a data broker or by deleting a few old accounts, you are able to significantly reduce the risk of becoming an online target.

Looking for a trustworthy data removal service? Subscribe to Incogni’s yearly subscription plan for just $5.79 per month and see how your personal information disappears from one data broker or people search site listing after another.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.


You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Bissell sale: Save up to 24% on vacuums and more
Next Article What is Log Monitoring in Cybersecurity
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

6 Personalized Stationery Sets for a Fancy Kind of Sentimentality
ARCHITECTURE 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
Businness 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?