Creating a digital toolkit for
users
How to teach our users how to limit their digital footprint
and escape hackers.
Justin Denton
I’m a Technology Innovator, spent time developing new
Technologies at IBM which were deployed to millions of new IBM
machines between 2002 to 2011. I also was the Faculty Lead and
acting Dean for the School of Technology at Rasmussen College.
I’ve always focused on the continued implementation of
technology into my day to day work to drive efficiencies.
In my most recent endeavor I took on the role of a Director with
Collegis Education to run a division of the company that is focused
on supporting over 40 College’s and Universities’ online classroom
environments.
I’m currently focused on providing industry leading levels of
support to the Higher Education Industry as well as grooming
team members of the support center into high performing
technology professionals. My passions are new technologies,
education, business process development, and accelerating the
growth of individuals through custom tailored learning
technologies.
https://www.linkedin.com/in/justindenton1/
Masters: Keller Graduate – Communications & Network Management
Bachelors: Devry – Network & Telecommunications Management
Certifications: ITIL Foundations, MCDST, MCP, & Crystal Reports
What are we talking about?
• Ever wonder what you should or shouldn’t share on the internet? Do you
see users who are posting everything thing they possibly could on the
internet and wonder how to help educate them to protect themselves?
• All of this collective sharing, creates a data gold mine for hackers to do
their evil bidding. In this session we will talk about what to post on the
internet and what not too. We will also look into what hackers can use
from the information you’ve posted on the internet and how they can use
it to gain access to your and your users personal lives, accounts, credit
cards, and more. During this session, we’ll dive into building a strategy
plan to help limit and hopefully eliminate these references from your
digital footprint to help ensure you are more secure than you were when
you first started this session.
• By the end of this webinar, attendees will have a virtual toolkit and
strategies to help educate users on protecting themselves while online.
Agenda
• Social Media can be your worst enemy.
• What to share / not to share.
• What do hackers use this info for?
• How to protect yourself.
• How long does this stuff last after I delete it?
• Are there tools to make this easier?
Social media can be your worst
enemy.
Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.
Why should I worry about posting stuff?
• Hackers can use it against you.
• Criminals can find out when your not home.
• Your personal information makes you more identifiable.
Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.
Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.
What to share / not to share.
Top items not to share…
• Personally Identifiable Information
• Phone number
• Email address
• Relatives Names
• When you’re on vacation & where.
• Money & Bank Information
• Hints about passwords (ie Dogs Names, Mother’s Maiden Name, etc.)
• Your Daily Schedule.
Who do you really know online?
• Do you know who you are sharing too?
• I have 1000’s of friends on Facebook, I can’t tell you if I know them all.
• Would you share what your about to share with the public?
• Would you scream it out loud inside Walmart?
What do hackers use this info
for?
Hackers…
• Harvest the data you post online to use against you.
• Can use your posts to guess your passwords & account information.
• Use your personal info to “Social Engineer” methods to obtain
account information.
• Role Playing / Impersonation
• Digital Dumpster Diving
• Use the old forgotten posts
Criminals / Scammers…
• View your posts to know when you’re not home.
• Make yourself a bigger target.
• Victim of Social Engineering
• That can you hear my call?
• Don’t answer Yes.
• Are you the lady of the house?
• Do you pay the household bills?
• Are you the homeowner?
Criminals / Scammers..
• Answering “Yes” on calls you don’t know
• Typically end up signing up up for something
• Just Say “No”.
• Calls can and will be recorded.
How to protect yourself.
Protect yourself
• Limit your Social Foot Print
• Monitor your Friends
• Watch what you post
• Keep your Personally Identifiable Information private
• Check your Security Settings
• Facebook has public options that are enabled by default.
Protect yourself
• How private you are online is up to you. -
Manage it well
• Be aware of what you share and with whom
• Be sure to familiarize yourself with geolocation
and location sharing. Check your settings to
make sure you keep this information private.
• Use Strong passwords & Don’t use something
that people know
• Remove unwanted internet posts/content
• Periodically search your name
Erase yourself from the Internet
• Although its difficult to do you
may want to:
• Delete your accounts from Social
Media Sites.
• Remove yourself from Background
Check Sites
Sites that have your background info
Intelius.com Acxiom.com
MyLife.com ZabaSearch.com
Spoke.com BeenVerified.com
PeekYou.com USSearch.com
PeopleFinders.com WhitePages.com
Spokeo.com Radaris.com
How long does this stuff last after
I delete it?
Its difficult to disappear
• Online its hard to disappear
• Delete accounts may not always remove past posts on others feeds
• You posts may have been shared by others
• May cause programmatical broken link errors
• Cool-Off Period
• May reactivate your account automatically if you accidentally logon
Background info sites
• It only lasts as long as you don’t do anything that hits public record
again.
• If you get arrested, fight a public legal battle, get married, buy a new
home, etc.
• Then you’ll need to repeat the process for peace of mind.
Social media
• Typically its instant
• But some sites have data retention policies
• Wait months possibly a year before it falls out completely
• The Way Back Machine may keep your data forever
• WikiDumps lets you download entire Wikipedia database
• YouTube Downloaders allow you to download videos to your
computer.
Are there tools to make this
easier?
How to get off these sites?
• Want to figure out how to remove yourself from the background
search sites?
• Check out site from LawyerCT
• http://tinyurl.com/backgone
Speed it up
• Account Killer maintain massive database of sites—more than 500 in
all. App can provide direct links to each one's deletion page.
• Just Delete Me offers a similar service, as well as a handy Chrome
Extension that will light up whenever you're on a site that JDM
recognizes and will link you directly to the site's account deletion
page.
• Knowem, finds sites that you may have forgotten about entirely by
doing a username search on more that 500 popular social sites.
Speed it up
• Deseat.me – Internet site aimed at cleaning up your online presence.
• DeleteMe from Abine – Paid Service to continue monitoring and
deleting your online presence.
Get a Status Check
• Zabasearch: Zabasearch is mostly about finding addresses and phone
numbers. Make a quick search of yourself and see what it knows.
• Intelius: Intelius can perform background checks, hunt down criminal
records, email addresses, social networks, and more. You have to pay to get
your results, but you'll get a general idea of what's out there by simply
searching your name.
• Spokeo: Spokeo is essentially an address book and it can track you down
suprisingly well to reveal your gender, age, phone number, address,
relatives, marital status, and a whole lot more. Again, it costs a bit of
money to get your full results, but you can get a general idea of what you
need to snuff out.
• Pipl: Pipl aggregates all of the above searches, but it's worth looking at to
make sure no others have slipped through the cracks.
The checklist
1. Review your accounts, posts and Days of the Internet Past
2. Remove old unwanted content
3. Remove personally identifiable information
4. Use tools to speed up the process
5. Continue searching yourself
Get it? Got it? Good.

More Related Content

PDF
Your Life Online
PPTX
Deep Web Search Part 2 by Cynthia Hetherington
PPT
Conducting Anonymous Online Investigations - Webinar
PDF
INTERNET SAFETY
PPT
DIGITAL FOOTPRINTS
PPTX
Tablets, Apps and Cybersecurity
PPT
Building Trust in the Digital Age
ODP
Digital Footprint
Your Life Online
Deep Web Search Part 2 by Cynthia Hetherington
Conducting Anonymous Online Investigations - Webinar
INTERNET SAFETY
DIGITAL FOOTPRINTS
Tablets, Apps and Cybersecurity
Building Trust in the Digital Age
Digital Footprint

What's hot (17)

PPTX
Digital Citizenship
PPTX
Advantages of Digital Identity
PPT
Digital Tattoo SLC 2010 Slideshow
PPTX
Digital Footprint
PPTX
Internet safety update
PPTX
06 12 13 LCAR Social Media Lunch And Learn
PPTX
Mang2049 intro session 07112017
PPTX
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
PPTX
Pinterest tos presentation (final)
PPT
OVES Social Media Networking BrownBag
PPT
Social media user guide
PPT
Guideline about responsible use of social networks
PPTX
Digital footprint presentation
PPT
Your e image presentation
PPT
Social Networking: An overview for all ages
PPT
Social media
PPTX
Mobile Security for the Modern Tech Mogul
Digital Citizenship
Advantages of Digital Identity
Digital Tattoo SLC 2010 Slideshow
Digital Footprint
Internet safety update
06 12 13 LCAR Social Media Lunch And Learn
Mang2049 intro session 07112017
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
Pinterest tos presentation (final)
OVES Social Media Networking BrownBag
Social media user guide
Guideline about responsible use of social networks
Digital footprint presentation
Your e image presentation
Social Networking: An overview for all ages
Social media
Mobile Security for the Modern Tech Mogul

Similar to Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers. (20)

PPTX
Tech" is a shortened form of the word "technology
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
Social groups for awareness
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Cybersecurity additional activities
PDF
Securing and Safeguarding Your Library Setup
PPTX
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Securing & Safeguarding Your Library Setup.pptx
PDF
Reo expo presentation_6-14-2011 vers1 6.11.11
PPTX
Internet security
PPTX
TheCyberThreatAndYou2_deck.pptx
PDF
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
PPT
8th grade presentation for slideshare
PPTX
[r]evolution Digital Literacy Workshop Slides
PPTX
Digital Identity
KEY
Pod camp boston 2011 locking up yourself online
PPTX
Corp Web Risks and Concerns
Tech" is a shortened form of the word "technology
Rules of Netiquette Empowerment Technologies Lesson
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Social groups for awareness
Rayane hazimeh building trust in the digital age teenagers and students
Cybersecurity additional activities
Securing and Safeguarding Your Library Setup
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Securing & Safeguarding Your Library Setup.pptx
Reo expo presentation_6-14-2011 vers1 6.11.11
Internet security
TheCyberThreatAndYou2_deck.pptx
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
8th grade presentation for slideshare
[r]evolution Digital Literacy Workshop Slides
Digital Identity
Pod camp boston 2011 locking up yourself online
Corp Web Risks and Concerns

More from Justin Denton (10)

PPTX
Introduction to Bitcoin and Crypto-currency
PPTX
Enhancing the User Experience with ​Smart Technologies
PPTX
Start of the new year by getting organized : Managing your life through the w...
PDF
Leveraging Cloud Based Technology to Increase Productivity
PPTX
Mesh Networks
PPTX
How to Insert your Library into the mobile sharing economy
PPTX
Leveraging Cloud Based Technologies for Increased Team Productivity
PPTX
Automating with the Internet of Things
PPTX
PPTX
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...
Introduction to Bitcoin and Crypto-currency
Enhancing the User Experience with ​Smart Technologies
Start of the new year by getting organized : Managing your life through the w...
Leveraging Cloud Based Technology to Increase Productivity
Mesh Networks
How to Insert your Library into the mobile sharing economy
Leveraging Cloud Based Technologies for Increased Team Productivity
Automating with the Internet of Things
Beyond the Brick and Mortar - NEFLIN 2016 - Hot Topics User Experience Confer...

Recently uploaded (20)

PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PDF
Identification of potential depression in social media posts
PDF
substrate PowerPoint Presentation basic one
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Examining Bias in AI Generated News Content.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
Altius execution marketplace concept.pdf
PDF
Human Computer Interaction Miterm Lesson
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
NewMind AI Journal Monthly Chronicles - August 2025
PDF
Launch a Bumble-Style App with AI Features in 2025.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Decision Optimization - From Theory to Practice
Streamline Vulnerability Management From Minimal Images to SBOMs
Identification of potential depression in social media posts
substrate PowerPoint Presentation basic one
Connector Corner: Transform Unstructured Documents with Agentic Automation
Examining Bias in AI Generated News Content.pdf
The AI Revolution in Customer Service - 2025
Altius execution marketplace concept.pdf
Human Computer Interaction Miterm Lesson
Co-training pseudo-labeling for text classification with support vector machi...
Report in SIP_Distance_Learning_Technology_Impact.pptx
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
NewMind AI Journal Monthly Chronicles - August 2025
Launch a Bumble-Style App with AI Features in 2025.pdf
CEH Module 2 Footprinting CEH V13, concepts
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Early detection and classification of bone marrow changes in lumbar vertebrae...
Decision Optimization - From Theory to Practice

Creating a digital toolkit for users: How to teach our users how to limit their digital footprint and escape hackers.

  • 1. Creating a digital toolkit for users How to teach our users how to limit their digital footprint and escape hackers.
  • 2. Justin Denton I’m a Technology Innovator, spent time developing new Technologies at IBM which were deployed to millions of new IBM machines between 2002 to 2011. I also was the Faculty Lead and acting Dean for the School of Technology at Rasmussen College. I’ve always focused on the continued implementation of technology into my day to day work to drive efficiencies. In my most recent endeavor I took on the role of a Director with Collegis Education to run a division of the company that is focused on supporting over 40 College’s and Universities’ online classroom environments. I’m currently focused on providing industry leading levels of support to the Higher Education Industry as well as grooming team members of the support center into high performing technology professionals. My passions are new technologies, education, business process development, and accelerating the growth of individuals through custom tailored learning technologies. https://www.linkedin.com/in/justindenton1/ Masters: Keller Graduate – Communications & Network Management Bachelors: Devry – Network & Telecommunications Management Certifications: ITIL Foundations, MCDST, MCP, & Crystal Reports
  • 3. What are we talking about? • Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves? • All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session. • By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
  • 4. Agenda • Social Media can be your worst enemy. • What to share / not to share. • What do hackers use this info for? • How to protect yourself. • How long does this stuff last after I delete it? • Are there tools to make this easier?
  • 5. Social media can be your worst enemy.
  • 7. Why should I worry about posting stuff? • Hackers can use it against you. • Criminals can find out when your not home. • Your personal information makes you more identifiable.
  • 10. What to share / not to share.
  • 11. Top items not to share… • Personally Identifiable Information • Phone number • Email address • Relatives Names • When you’re on vacation & where. • Money & Bank Information • Hints about passwords (ie Dogs Names, Mother’s Maiden Name, etc.) • Your Daily Schedule.
  • 12. Who do you really know online? • Do you know who you are sharing too? • I have 1000’s of friends on Facebook, I can’t tell you if I know them all. • Would you share what your about to share with the public? • Would you scream it out loud inside Walmart?
  • 13. What do hackers use this info for?
  • 14. Hackers… • Harvest the data you post online to use against you. • Can use your posts to guess your passwords & account information. • Use your personal info to “Social Engineer” methods to obtain account information. • Role Playing / Impersonation • Digital Dumpster Diving • Use the old forgotten posts
  • 15. Criminals / Scammers… • View your posts to know when you’re not home. • Make yourself a bigger target. • Victim of Social Engineering • That can you hear my call? • Don’t answer Yes. • Are you the lady of the house? • Do you pay the household bills? • Are you the homeowner?
  • 16. Criminals / Scammers.. • Answering “Yes” on calls you don’t know • Typically end up signing up up for something • Just Say “No”. • Calls can and will be recorded.
  • 17. How to protect yourself.
  • 18. Protect yourself • Limit your Social Foot Print • Monitor your Friends • Watch what you post • Keep your Personally Identifiable Information private • Check your Security Settings • Facebook has public options that are enabled by default.
  • 19. Protect yourself • How private you are online is up to you. - Manage it well • Be aware of what you share and with whom • Be sure to familiarize yourself with geolocation and location sharing. Check your settings to make sure you keep this information private. • Use Strong passwords & Don’t use something that people know • Remove unwanted internet posts/content • Periodically search your name
  • 20. Erase yourself from the Internet • Although its difficult to do you may want to: • Delete your accounts from Social Media Sites. • Remove yourself from Background Check Sites
  • 21. Sites that have your background info Intelius.com Acxiom.com MyLife.com ZabaSearch.com Spoke.com BeenVerified.com PeekYou.com USSearch.com PeopleFinders.com WhitePages.com Spokeo.com Radaris.com
  • 22. How long does this stuff last after I delete it?
  • 23. Its difficult to disappear • Online its hard to disappear • Delete accounts may not always remove past posts on others feeds • You posts may have been shared by others • May cause programmatical broken link errors • Cool-Off Period • May reactivate your account automatically if you accidentally logon
  • 24. Background info sites • It only lasts as long as you don’t do anything that hits public record again. • If you get arrested, fight a public legal battle, get married, buy a new home, etc. • Then you’ll need to repeat the process for peace of mind.
  • 25. Social media • Typically its instant • But some sites have data retention policies • Wait months possibly a year before it falls out completely • The Way Back Machine may keep your data forever • WikiDumps lets you download entire Wikipedia database • YouTube Downloaders allow you to download videos to your computer.
  • 26. Are there tools to make this easier?
  • 27. How to get off these sites? • Want to figure out how to remove yourself from the background search sites? • Check out site from LawyerCT • http://tinyurl.com/backgone
  • 28. Speed it up • Account Killer maintain massive database of sites—more than 500 in all. App can provide direct links to each one's deletion page. • Just Delete Me offers a similar service, as well as a handy Chrome Extension that will light up whenever you're on a site that JDM recognizes and will link you directly to the site's account deletion page. • Knowem, finds sites that you may have forgotten about entirely by doing a username search on more that 500 popular social sites.
  • 29. Speed it up • Deseat.me – Internet site aimed at cleaning up your online presence. • DeleteMe from Abine – Paid Service to continue monitoring and deleting your online presence.
  • 30. Get a Status Check • Zabasearch: Zabasearch is mostly about finding addresses and phone numbers. Make a quick search of yourself and see what it knows. • Intelius: Intelius can perform background checks, hunt down criminal records, email addresses, social networks, and more. You have to pay to get your results, but you'll get a general idea of what's out there by simply searching your name. • Spokeo: Spokeo is essentially an address book and it can track you down suprisingly well to reveal your gender, age, phone number, address, relatives, marital status, and a whole lot more. Again, it costs a bit of money to get your full results, but you can get a general idea of what you need to snuff out. • Pipl: Pipl aggregates all of the above searches, but it's worth looking at to make sure no others have slipped through the cracks.
  • 31. The checklist 1. Review your accounts, posts and Days of the Internet Past 2. Remove old unwanted content 3. Remove personally identifiable information 4. Use tools to speed up the process 5. Continue searching yourself
  • 32. Get it? Got it? Good.

Editor's Notes

  • #19: Accept friends that you know