Hi All,
I am new to these discussions and I apologie in advance if this topic has already been talked about. My concern has to do with maintaining all the items the Digital Identity Protection app identifies as vulnerabilities and excesses in one's "digital footprint".
My main concern is how many "services" are listed in one's digital footprint. Many of the websites on my footprint list must be websites that got piggy backed onto some other website for which I visited. In addition, when one clicks on the link called "manage your data" for any given website on one's footprint list you have the choices of deleting your data and requesting all the personal data that website collected about you.
These are great tools but in some cases the action cannot be completed. If the action cannot be completed you have to spend time researching why an action cannot be completed. I personally do not feel motivated to root through whatever avenues are required to reach resolution. What is a good resource for that?
On top of that, I got a dark web alert that says there was a Financial Data Collection October 2024 data breach (whatever the hell that was). My hope is the Digital Identity Protection app will take action when there is impending financial harm I experience (knowing what may have happend in the past may not be remediated). Otherwise, I just have to sit and wonder whan and what criminals are selling my SSN, phone #, home address, and whatever else might be valuable information about me from that data breach. From what I understand, breaches like that affect millions of people and peons like me just might be at the bottom of the food chain but that is an uncomfortably questionable form of optimism.
In other words, the Digital Identity Potection app is both a boon and a bane. There is security in knowing I have an app that alerts me to potential problems and directs me to solve them but there are a lot of cases where the solution appears to be very obscure for one who is not all that savvy about cyber security and how threats can be stemmed and how holes in your security can be sufficiently plugged.
Thanks,
Jack