Monitor, harden, sanitize, or remove your digital presence

What Can We Help You With?

Recent Updates

09/03/20: Privacy Policy updated
04/13/20: Terms of Service updated
03/19/20: Social Media Audit officially added
03/11/20: Updated Contact Forms for site pages
01/25/20: Terms of Service updated. Please review

Quick Tips

You can remove metadata from an image on Windows by right-clicking the image, selecting “Properties,” selecting the “Details” tab, and clicking “Remove Properties and Personal Information” at the bottom.
Remember to shred all documents that have any of your personal information on them. Identity thieves will hunt for this type of information in trash.
Don’t respond to spam emails. Responding gives notice that your email is an active target.
Have a company and posting a job listing? Limit the technical details within your ad, if you can. Hackers will check for these ads to gain information about what types of hardware/software the company uses in order to plan attacks.
Ensure no personal information, such as mail with your address on it, is visible through your vehicle windows while parked in public.
Be cautious of completing online surveys and polls. These have been known to be data harvesting ploys to be sold to data brokers.
When using card readers, such as those at ATM’s and fuel pumps, physically inspect the reader for signs of a skimming device.
When creating passwords, avoid using words that would be easily known by others or found by looking at your social media accounts — such as pet names, children names, and birth dates/years.
Always have a strong password for your wireless network. If somebody uses your WiFi for illicit activities, the IP address they used will be traceable to your physical address.
Google Alerts will contact you if criteria you specified becomes searchable via their services, just do not set alerts for sensitive information. See more here:
Selling or disposing of an old computer or phone? Remember to erase and reformat the storage drives so your data cannot be recovered.
Use different passwords for different sites, otherwise one compromised account may easily lead to all accounts becoming compromised.


rechor offers several options for locating and removing your data from the Internet

Have questions? See the FAQ section or email: