{"id":7752,"date":"2023-03-01T08:56:55","date_gmt":"2023-03-01T13:56:55","guid":{"rendered":"https:\/\/joindeleteme.com\/blog\/?p=7752"},"modified":"2025-02-24T17:06:57","modified_gmt":"2025-02-24T22:06:57","slug":"executive-reputation-management","status":"publish","type":"b2b-post","link":"https:\/\/joindeleteme.com\/business\/blog\/executive-reputation-management\/","title":{"rendered":"Executive Reputation Management: How Data Brokers Pose a Risk"},"content":{"rendered":"\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h2>Table of Contents<\/h2><nav><ul><li><a href=\"#4-ways-data-brokers-increase-executives-reputational-risk\">4 Ways Data Brokers Increase Executives\u2019 Reputational Risk<\/a><\/li><li><a href=\"#executive-reputation-management-vs-delete-me\">Executive Reputation Management vs. DeleteMe<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<p>There\u2019s no shortage of executive reputation management strategies. Some popular ones include thought leadership, monitoring online reviews, search engine optimization (SEO), and maintaining an active social media presence.&nbsp;<\/p>\n\n\n\n<p>However, another important part of executive online reputation management is data broker removal.<\/p>\n\n\n\n<p><a href=\"https:\/\/joindeleteme.com\/blog\/what-are-data-brokers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data brokers<\/a> collect information about executives and then sell this data to third parties like marketers. Because few data brokers do customer vetting, executive personal information can also end up in the hands of bad actors such as cybercriminals or disgruntled customers.<\/p>\n\n\n\n<p>Hard to remove and difficult to keep on top of, data broker profiles expose your company\u2019s executives and thought leaders to a host of threats that can ruin their good reputation.<\/p>\n\n\n\n<p>This short guide explains why data broker opt-outs are essential to executive and CEO reputation management services and why removing upper management data from online sources can help preserve executives\u2019 online image and their companies\u2019 reputations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4-ways-data-brokers-increase-executives-reputational-risk\">4 Ways Data Brokers Increase Executives\u2019 Reputational Risk<\/h2>\n\n\n\n<p>Personal information about executives on data broker sources exposes upper management to four types of risk: Cyber attacks, impersonations, mistaken identity, and harassment.<\/p>\n\n\n\n<p>All can have a significant impact on executives\u2019 personal brand and public persona and cause serious harm to their and their organizations\u2019 positive reputations.<\/p>\n\n\n\n<p>Data broker opt-outs help your business maintain favorable executive and brand reputation and control the online narrative.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-attacks\">Cyber attacks&nbsp;<\/h3>\n\n\n\n<p><strong>What: <\/strong>Cyber incidents, especially ones that compromise customers\u2019 data.&nbsp;<\/p>\n\n\n\n<p><strong>How: <\/strong>C-suite executives are often the ones who enable cyber attacks in the first place.<\/p>\n\n\n\n<p>This is because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Executives have high levels of access. <\/strong>This makes business leaders an attractive target for threat actors.&nbsp;<\/li>\n\n\n\n<li><strong>Executives are highly visible.<\/strong> Due to their high profile, it\u2019s easy for hackers to find personal information about corporate leaders through online sources like data brokers. They can then use this personal data to guess passwords and security questions, personalize phishing emails, and conduct MFA fatigue attacks.&nbsp;<\/li>\n\n\n\n<li><strong>Executives frequently sacrifice security for convenience. <\/strong>C-level executives <a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2020\/05\/29\/cybersecuritys-greatest-insider-threat-is-in-the-c-suite\/?sh=6e0d893f7626\" target=\"_blank\" rel=\"noreferrer noopener\">admit to circumventing security protocols<\/a> if they\u2019re in a rush.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"201\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-112646-1024x201-1.png\" alt=\"Twitter post about CEO clicking on a phishing email\" class=\"wp-image-10187\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-112646-1024x201-1.png 1024w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-112646-1024x201-1-300x59.png 300w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-112646-1024x201-1-768x151.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>For example, the aerospace and defense company FACC&#8217;s CEO <a href=\"https:\/\/www.reuters.com\/article\/us-facc-ceo-idUSKCN0YG0ZF\/\" target=\"_blank\" rel=\"noreferrer noopener\">was fired immediately<\/a> after a threat actor <a href=\"https:\/\/joindeleteme.com\/business\/blog\/data-broker-opt-outs-ceo-fraud-prevention\/\">impersonated them<\/a> to socially engineer a finance employee into making a 50 million euro transfer.<\/p>\n\n\n\n<p>While FACC did not share details of what the phishing email looked like, the threat actor likely personalized it with information found through online sources.&nbsp;<\/p>\n\n\n\n<p><strong>Impact on executive reputation: <\/strong>When a company falls victim to a cyber attack, customers rarely blame the cybercriminals responsible for the attack. More often, they <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200608005040\/en\/40-of-Consumers-Hold-CEO-Personally-Responsible-for-Ransomware-Attacks-Research-Shows\" target=\"_blank\" rel=\"noreferrer noopener\">blame C-level executives<\/a> like the chief executive officer (CEO).&nbsp;<\/p>\n\n\n\n<p>With devastating attacks happening almost daily, Americans expect businesses to take cyber risk seriously. Customers are unforgiving when they find out that their data was compromised.&nbsp;<\/p>\n\n\n\n<p>After a breach, negative publicity (including negative reviews on review sites, social media comments, and other negative content) is the norm. For business executives, the resulting negative press can be hard to shake.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"446\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-115756-1024x446-1.png\" alt=\"Twitter post about CEO resigning after a cyber attack\" class=\"wp-image-10188\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-115756-1024x446-1.png 1024w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-115756-1024x446-1-300x131.png 300w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Screenshot-2023-02-20-115756-1024x446-1-768x335.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"impersonations\">Impersonations<\/h3>\n\n\n\n<p><strong>What:<\/strong> Fake executive accounts on social media platforms (i.e., LinkedIn, Facebook, etc.) and\/or emails to clients\/vendors that seem to come from an executive but are actually from a threat actor.&nbsp;<\/p>\n\n\n\n<p><strong>How: <\/strong>All a cybercriminal needs to create social media accounts in an executive\u2019s name or write fraudulent emails to clients, vendors, and other third parties is an executive\u2019s personal information.&nbsp;<\/p>\n\n\n\n<p>For example, email address, phone number, and employment history. This data is available with a simple Google search, most commonly via data broker websites.&nbsp;<\/p>\n\n\n\n<p>Perhaps unsurprisingly, executive impersonations are on an <a href=\"https:\/\/www.phishlabs.com\/blog\/dramatic-increase-detected-in-impersonation-attacks-on-social-media\/\" target=\"_blank\" rel=\"noreferrer noopener\">upward trajectory<\/a>.<\/p>\n\n\n\n<p><strong>Impact on executive reputation:<\/strong> Executive impersonations negatively affect an executive\u2019s corporate reputation. They can mislead customers and vendors and influence the public\u2019s opinion about an executive and the company they work for.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mistaken-identity-incidents\">Mistaken identity incidents<\/h3>\n\n\n\n<p><strong>What: <\/strong>When someone believes that an executive is someone else.&nbsp;<\/p>\n\n\n\n<p><strong>How:<\/strong> Data broker negligence. There are two key ways executive misidentification happens.<\/p>\n\n\n\n<p>The first and most common one is erroneous background checks.&nbsp;<\/p>\n\n\n\n<p>Prospective employers often perform background checks using data broker sources. However, because data brokers are error-prone, an executive\u2019s profile may include incorrect information. This can cost an executive a job.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Slide-4_3-5-1.png\" alt=\"Data broker errors\" class=\"wp-image-10189\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Slide-4_3-5-1.png 1024w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Slide-4_3-5-1-300x225.png 300w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/Slide-4_3-5-1-768x576.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The second is internet vigilantism.&nbsp;<\/p>\n\n\n\n<p>It has become increasingly common for the general public to take \u201cjustice\u201d into their own hands via methods like internet sleuthing and <a href=\"https:\/\/joindeleteme.com\/doxxing\/\" target=\"_blank\" rel=\"noreferrer noopener\">doxxing<\/a>.&nbsp;<\/p>\n\n\n\n<p>Finance marketing executive Peter Weinberg experienced this first-hand when online vigilantes <a href=\"https:\/\/nymag.com\/intelligencer\/2020\/06\/what-its-like-to-get-doxed-for-taking-a-bike-ride.html\" target=\"_blank\" rel=\"noreferrer noopener\">misidentified him<\/a> as someone who had physically attacked children and adults on a trail that Weinberg regularly cycled.&nbsp;<\/p>\n\n\n\n<p>After the local law enforcement shared the wrong date for when this incident happened, internet vigilantes conducted open-source intelligence and decided that Weinberg was the man in question.&nbsp;<\/p>\n\n\n\n<p>Weinberg then started to receive threatening messages like \u201cNice job assaulting a small child today. You need to be fired from your job immediately\u201d and \u201cYou deserve to pay.\u201d&nbsp;<\/p>\n\n\n\n<p>He was doxxed, and his home address was publicly shared.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"471\" height=\"512\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/unnamed-8.png\" alt=\"Twitter post about being misidentified \" class=\"wp-image-10190\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/unnamed-8.png 471w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/unnamed-8-276x300.png 276w\" sizes=\"(max-width: 471px) 100vw, 471px\" \/><\/figure>\n\n\n\n<p><strong>Impact on reputation: <\/strong>When an executive is mistaken for someone else, their reputation can be damaged through no fault of their own. Business reputation can also suffer as a result.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"harassment\">Harassment<\/h3>\n\n\n\n<p><strong>What:<\/strong> Details from an executive\u2019s personal life or past being used against them.<\/p>\n\n\n\n<p><strong>How: <\/strong>As data broker profiles become more detailed, third parties have access to more and more of executives\u2019 personal information.<\/p>\n\n\n\n<p>In addition to basic data points like email addresses and phone numbers, bad actors (ex-employees, co-workers, activists, etc.) can now find out information about an executive\u2019s family relationships, political affiliations, donations, and more.<\/p>\n\n\n\n<p><strong>Impact on reputation: <\/strong>Depending on how sensitive the information a threat actor can find is (like if an executive is donating to a controversial cause or their spouse or kids have attended a controversial rally), this could cause serious damage to an executive\u2019s and their company\u2019s reputation.&nbsp;<\/p>\n\n\n\n<p>For example, the former CEO of a popular web browser <a href=\"https:\/\/www.theguardian.com\/technology\/2014\/apr\/03\/mozilla-ceo-brendan-eich-resigns-prop-8\" target=\"_blank\" rel=\"noreferrer noopener\">had to resign<\/a> after just two weeks of being appointed for the role. The reason? It came to light that several years prior, he had donated in support of a controversial ballot initiative and contributions to fringe Republican candidates.&nbsp;<\/p>\n\n\n\n<p>In this case, the ex-CEO\u2019s reputation was damaged to the point where his personal actions were being held against him years later, even impacting the reputation of a company he co-founded.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"267\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/eich-1024x267-1.png\" alt=\"Twitter post about founder \" class=\"wp-image-10191\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/eich-1024x267-1.png 1024w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/eich-1024x267-1-300x78.png 300w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/eich-1024x267-1-768x200.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.webershandwick.com\/news\/corporate-reputation-2020-everything-matters-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to research<\/a> by the New York-based public relations firm Weber Shandwick, a company\u2019s and its executives\u2019 reputation can also have a substantial effect on a company\u2019s market value and bottom line. Besides impacting profitability, a reputation crisis can result in strained stakeholder relationships and negative company culture (including lower employee retention).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"executive-reputation-management-vs-delete-me\">Executive Reputation Management vs. DeleteMe<\/h2>\n\n\n\n<p>An executive\u2019s online presence is made up of more than just news articles, forum discussions, tweets, and their company\u2019s digital marketing initiatives.<\/p>\n\n\n\n<p>With personal information easily accessible via data brokers, anyone can find out sensitive details about an executive\u2019s life and then use that information to cause reputational damage, either directly (i.e., by sharing controversial information publicly) or indirectly (i.e., through a cyber attack or impersonation incident).<\/p>\n\n\n\n<p>Executives and their teams must consider all the ways that bad actors could harm their reputations to avoid having to subcontract a crisis management team.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/joindeleteme.com\/business\/\">DeleteMe removes executive data<\/a> from data broker sources, making it more difficult for threat actors to use personal information in attacks against business leaders.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s no shortage of executive reputation management strategies. Some popular ones include thought leadership, monitoring online reviews, search engine optimization (SEO), and maintaining an active social media presence.&nbsp; However, another important part of executive online reputation management is data broker removal. Data brokers collect information about executives and then sell this data to third parties [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":7758,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"b2b-category":[45],"class_list":["post-7752","b2b-post","type-b2b-post","status-publish","format-standard","has-post-thumbnail","hentry","b2b-category-resources"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/b2b-post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7752\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/7758"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=7752"}],"wp:term":[{"taxonomy":"b2b-category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-category?post=7752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}