Monitor, harden, sanitize, or remove your digital presence

What Can We Help You With?

Recent Updates

09/03/20: Privacy Policy updated
04/13/20: Terms of Service updated
03/19/20: Social Media Audit officially added
03/11/20: Updated Contact Forms for site pages
01/25/20: Terms of Service updated. Please review

Quick Tips

When creating passwords, avoid using words that would be easily known by others or found by looking at your social media accounts — such as pet names, children names, and birth dates/years.
Ensure no personal information, such as mail with your address on it, is visible through your vehicle windows while parked in public.
Selling or disposing of an old computer or phone? Remember to erase and reformat the storage drives so your data cannot be recovered.
Google Alerts will contact you if criteria you specified becomes searchable via their services, just do not set alerts for sensitive information. See more here:
Remember to shred all documents that have any of your personal information on them. Identity thieves will hunt for this type of information in trash.
Have a company and posting a job listing? Limit the technical details within your ad, if you can. Hackers will check for these ads to gain information about what types of hardware/software the company uses in order to plan attacks.
Always have a strong password for your wireless network. If somebody uses your WiFi for illicit activities, the IP address they used will be traceable to your physical address.
You can remove metadata from an image on Windows by right-clicking the image, selecting “Properties,” selecting the “Details” tab, and clicking “Remove Properties and Personal Information” at the bottom.
Be cautious of completing online surveys and polls. These have been known to be data harvesting ploys to be sold to data brokers.
Use different passwords for different sites, otherwise one compromised account may easily lead to all accounts becoming compromised.
When using card readers, such as those at ATM’s and fuel pumps, physically inspect the reader for signs of a skimming device.
Don’t respond to spam emails. Responding gives notice that your email is an active target.


rechor offers several options for locating and removing your data from the Internet

Have questions? See the FAQ section or email: