All Levels
25 min read
30 pages
Updated 2026-02-16

Scanner Strategy Guide

Which scanners to run, when, and why. Plus how to interpret and act on results

1

Scanner Ecosystem

Before you run a single scan, it pays to understand how the system is built and why. The 18 Advanced Scanners are not a random collection of tools. They are organised into four purposeful categories that mirror the four phases of reputation management: protecting what you have, discovering what exists, growing your authority, and investigating specific concerns. This chapter explains the architecture, the credit model that controls access, and exactly what happens behind the scenes the moment you press "Run".

The Four Scanner Categories

Every scanner belongs to one of four categories: Protect, Discover, Grow, and Targeted. Each category has a distinct job. Think of them as four departments inside a personal reputation intelligence firm, each staffed with specialists, each reporting to you.

Scanner Categories at a Glance

Protect (6 scanners)Defensive intelligence. Finds threats before they find you: breached credentials, background check exposure, data broker listings, and leaked personal information.
Discover (5 scanners)Reconnaissance and mapping. Builds a complete picture of your existing digital footprint: every mention, profile, media hit, and network connection across the open web.
Grow (4 scanners)Authority and growth signals. Measures how strongly your expertise registers online: citation authority, thought-leadership content, speaking credentials, and professional endorsements.
Targeted (3 scanners)Precision investigations. Deep-dives into specific, high-stakes concerns such as image misuse, impersonation, or a single platform that matters most to your career.

The categories are intentionally layered. Protect scanners establish your baseline safety. Discover scanners map the territory. Grow scanners reveal where you stand relative to your potential. Targeted scanners let you zoom in when something specific needs attention. Most users benefit from running at least one scanner from each category every quarter.

Where to Start if You Are Brand New

Run the Digital Footprint Scan (Discover) and the Data Breach Scan (Protect) first. Together they answer the two most urgent questions: "What does the internet already know about me?" and "Has any of that information been stolen?" Everything else builds on those two baselines.

Certain life events should trigger a full cross-category scan. Starting a new job, launching a business, entering a high-profile industry, going through a public dispute, or preparing for a board appointment all create moments where a complete scan across all four categories is worth the credit investment. The decision framework in Chapter 5 maps those triggers precisely.

How the Credit-Based Access Model Works

Advanced Scanners operate on a credit system that gives every plan tier access to the full scanner marketplace while keeping costs proportional to how much scanning you actually need. Credits are consumed per scan run, not per month and not per account. You buy what you use.

Plan Tier Credit Allowances

Free5 credits per month, automatically replenished. Access to all Discover scanners and one Protect scanner. Ideal for a first-look assessment.
Premium30 credits per month included, with the option to purchase additional packs. Full access to Protect and Discover. Grow scanners available at a higher credit rate.
PlatinumUnlimited credits for standard scans. All 18 scanners unlocked including all Targeted scanners. Priority scan queue for faster results.
  • Standard scans (Discover category) cost 1 credit each.
  • Protect and Grow scanners cost 2 credits each due to third-party data source fees.
  • Targeted scanners cost 3 credits each. They run deeper, multi-source investigations that take longer to complete.
  • Credits roll over within the same calendar month but do not accumulate indefinitely. Unused credits after 90 days are forfeited.
  • Bonus credits are awarded when you complete your profile, link social accounts, or respond to AI coaching prompts.

Make Credits Go Further

Review your Evidence Hub before running a repeat scan. If the hub already contains recent evidence on a topic (collected within 14 days), a new scan may return nearly identical results. Save credits by acting on existing evidence first, then re-scanning after you have made changes.

Credit purchases are available in packs of 10, 25, and 100. Packs never expire and are tied to your account, not your subscription tier. If you downgrade your plan, any purchased credits remain usable. The Platinum unlimited tier applies only to the credits included with the plan; purchased packs are always separate and permanent.

What Happens When You Run a Scan

Understanding the scan pipeline helps you set the right expectations and troubleshoot when results look unexpected. Every scan follows the same five-stage process, though the specific data sources differ by category.

  1. 1Identity Anchoring: Our system pulls your verified identity data from your KYC card: full name, known aliases, organisation, location, and any social handles you have linked. This anchors the search so results are about you, not someone with a similar name.
  2. 2Source Querying: The scanner queries its designated data sources in parallel. A single scan may touch anywhere from 3 to 40+ external sources depending on its category. Protect scanners query breach databases, background records, and data broker registries. Discover scanners crawl the open web, news archives, and social indices.
  3. 3Deduplication and Relevance Scoring: Raw results are deduplicated and scored for relevance using your identity anchor. Our AI discards results that clearly refer to a different person, flags ambiguous matches, and surfaces high-confidence matches first.
  4. 4Evidence Packaging: Confirmed results are packaged as structured evidence items and sent to your Evidence Hub. Each item includes the source, confidence score, date found, and a plain-English summary of what it means for your reputation.
  5. 5Score Impact Calculation: The system recalculates the affected pillar scores and updates your overall Reputation Score. A badge appears in your dashboard showing which pillars were affected by the latest scan run.

Typical Scan Completion Times

Discover scanners2 to 8 minutes
Protect scanners5 to 15 minutes
Grow scanners8 to 20 minutes
Targeted scanners15 to 45 minutes

Scans Run in the Background

You do not need to keep the browser open while a scan runs. Our system queues and processes scans server-side and sends you a notification (email or in-app, your choice) the moment results are ready. Platinum users are placed at the front of the processing queue during peak hours.

Scans are non-destructive and invisible. Running a scan does not notify the people or organisations whose data appears in results. It does not create a record in any external system. It does not affect your credit score, professional licences, or any third-party profile. You are observing information that already exists; our scanners simply surface it faster and more systematically than manual searching would.

Inside Reputation Scorecard

Reputation ScoreFree

Every scan result feeds directly into your eight-pillar reputation score. A single scan can shift multiple pillars simultaneously as new evidence is processed.

2

Protect Scanners

Your reputation can be damaged by information you never chose to share. Data brokers compile and sell personal records. Breach databases hold credentials from incidents you may have forgotten. Background check agencies aggregate public records that can surface misleading or outdated information. The six Protect scanners exist for one reason: to show you exactly what defensive exposure you have so you can act before someone else finds it first.

Background Check Scanners

Two of the six Protect scanners focus specifically on the types of records that appear in formal background checks, the reports that employers, boards, and investment partners commission when evaluating you. Most people have never seen their own background check. That is a significant blind spot.

Background Check Scanners

Professional Records Scan (2 credits)Searches public court records, regulatory filings, company registries, and professional licence databases across 45+ jurisdictions. Surfaces judgements, disqualifications, sanctions, or licence suspensions linked to your name.
Media Adverse Coverage Scan (2 credits)Specifically hunts for negative press: investigative journalism, controversy coverage, public complaints, and critical opinion pieces, across news archives going back 10 years.

The Professional Records Scan is most valuable before career transitions. If you are being considered for a C-suite role, a board seat, a financial services position, or any role requiring regulatory approval, the hiring organisation will run a check similar to this one. Running it yourself first means no surprises and gives you time to prepare explanations or seek corrections for any inaccurate records.

  • Run the Professional Records Scan annually as a baseline, and again before any major career event.
  • If results surface records you believe are inaccurate, note the source court or agency. That is the entity you will need to contact for a correction.
  • The Media Adverse Coverage Scan is especially important for anyone in financial services, law, healthcare, or public-sector roles where historic coverage can affect current-day eligibility.
  • Adverse coverage that is old but truthful cannot be removed, but it can be contextualised. Use Narratives Intelligence to build a counter-narrative before an interview process begins.

What Background Checks Cannot Surface

Background check scanners rely on publicly available records. Private databases (such as those used by government security clearance processes) and sealed or expunged records are outside their reach. If your specific concern involves sealed records, consult a legal professional rather than relying solely on scanner results.

Data Breach Detection

A data breach does not just mean someone read your email. It means that credentials, personal identifiers, or sensitive account details associated with your email addresses or usernames are available to anyone willing to purchase or download stolen datasets. Breach data is used for credential stuffing, phishing, identity theft, and increasingly, reputational attacks that weaponise personal information against you.

Breach Detection Scanners

Credential Breach Scan (2 credits)Checks your known email addresses and usernames against a continuously updated database of 15 billion+ breached records. Returns a list of incidents, the specific data fields exposed in each, and the breach date.
Dark Web Exposure Scan (2 credits)Goes a layer deeper: checks dark web marketplaces and paste sites for active listings of your personal information. Indicates whether stolen data is currently being traded, not just whether it was ever part of a breach.
  1. 1Run the Credential Breach Scan for every email address you use: personal, professional, and any old addresses you may have abandoned.
  2. 2When a breach is identified, note which specific data fields were exposed (password hash, phone number, home address, etc.). Each exposed field requires a different remediation action.
  3. 3If the scan confirms a password was exposed, change that password everywhere you have reused it. Use a password manager to generate and store unique passwords going forward.
  4. 4Run the Dark Web Exposure Scan if the Credential Breach Scan returns multiple incidents, if you work in a high-profile or high-risk industry, or if you have recently noticed unusual account activity.
  5. 5Re-run both breach scans every 90 days. New breach datasets are released constantly, and your exposure changes even when your own behaviour does not.

A Breach Result is Not an Emergency: It Is a Checklist

Seeing breach results for the first time is alarming, but most breach data is years old and the immediate threat has usually passed. Work through results methodically: change affected passwords, enable two-factor authentication on key accounts, and monitor for identity theft indicators. Panic leads to mistakes; a checklist mindset leads to resolution.

The Dark Web Exposure Scan is available to Premium and Platinum users only. If you are on a Free plan and the Credential Breach Scan surfaces multiple incidents, upgrading to Premium before running the Dark Web scan is a reasonable next step. The additional intelligence is often worth the investment when active exposure is suspected.

Transparency & Trust Assessment Scans

Data brokers are companies whose entire business model is collecting, aggregating, and selling personal information: addresses, phone numbers, family members, income estimates, employment history, and more. Most people are listed on dozens of broker sites without ever having consented. The Transparency & Trust scanners map your exposure across this landscape.

Transparency & Trust Scanners

Data Broker Exposure Scan (2 credits)Searches 200+ data broker and people-search websites for listings containing your name, address history, phone numbers, and family associations. Returns a ranked list by exposure severity.
Personal Information Leakage Scan (2 credits)Looks for personal information embedded in public documents, including PDFs, forum posts, social media bios, old website registrations, and WHOIS records, that you may not realise is still publicly accessible.

The Data Broker Exposure Scan is the starting point for anyone concerned about privacy: from executives worried about physical security, to individuals who have experienced stalking or harassment, to professionals who simply prefer to keep personal details off the open web. Results typically surface 20 to 80 listings for the average person, which sounds alarming but is entirely normal. The goal is not zero listings overnight. It is systematic reduction over time.

  • After running the Data Broker Exposure Scan, export the full results list from your Evidence Hub. Use it as your opt-out checklist. Most brokers have a removal request form, and the Digital Cleanup Guide walks you through the process.
  • Prioritise removals from brokers that display your home address and phone number. These carry the highest physical safety risk.
  • The Personal Information Leakage Scan is particularly useful for professionals who registered websites in the early 2000s (WHOIS data was public by default before GDPR), participated in public forums under their real name, or uploaded documents without reviewing metadata.
  • Re-run transparency & trust scans quarterly. Brokers re-list removed data. This is not a one-and-done process.

Continuous Data Broker Removal (Platinum)

Platinum users have access to Continuous Data Broker Removal, an automated system that submits opt-out requests on your behalf every 30 days, monitors for re-listings, and re-submits when your data reappears. Manual removal is effective; automated removal is permanent.

3

Discover Scanners

You cannot manage what you cannot see. The five Discover scanners build a comprehensive map of your existing digital presence, including every indexed page, every mention in the press, and every professional network signal, so that you are working from facts, not assumptions. Most users are surprised by what they find: some discover they have a much stronger footprint than they realised; others find that years of professional work have left almost no trace. Both are actionable insights.

Digital Footprint Scan

The Digital Footprint Scan is the most foundational scanner in the entire library. It crawls the open web for any page that contains your name, known aliases, or linked identifiers, then maps every result into a structured inventory. Think of it as building a personal search index, except filtered to be about you, de-duplicated, and categorised by content type.

Digital Footprint Scan Details

Credit cost1 credit
Sources searchedMajor search engines (Bing, DuckDuckGo, and others), LinkedIn, Twitter/X, Facebook, Instagram, YouTube, Wikipedia, personal website crawls, GitHub, Crunchbase, company websites
Results returnedCategorised list of URLs (professional profiles, social accounts, news articles, forum posts, images, videos, academic papers), with a sentiment indicator for each
Best forEstablishing a baseline, preparing for a background check, or beginning any reputation improvement programme

The first time you run the Digital Footprint Scan, treat the results as your reputation audit. Go through every category. Look for profile pages you did not know existed: old employer bio pages, directory listings, alumni sites. Look for social accounts you created and forgot. Look for any results where your name is associated with content you would not want a hiring manager or client to find.

  1. 1Run the Digital Footprint Scan before starting any other scanner programme. It sets the context for everything that follows.
  2. 2Sort results by sentiment. Start with the negative or neutral results that appear on page one of search engines. These have the highest visibility impact.
  3. 3Export the full URL list and open each result. Automated classification is accurate but not perfect; a human review catches edge cases.
  4. 4Flag any results you want to remove or push down in search results. These become your Digital Cleanup list (see the Digital Cleanup Guide for tactics).
  5. 5Run this scan every 6 months, or any time you publish significant new content or change roles.

Your Footprint Score

After the Digital Footprint Scan completes, your dashboard displays a Footprint Score, a 0 to 100 measure of how prominently and positively you appear online relative to your professional profile. A score below 40 means significant opportunity to build visibility. A score above 70 means strong presence, with attention needed on quality and consistency rather than quantity.

Media Mentions and Sentiment Analysis

Being mentioned in the press, whether favourably or critically, shapes how others perceive you in ways that no profile page can match. News coverage carries third-party authority. A single well-placed article can transform your reputation more than years of self-published content. The Media Mentions scanner finds all of it: positive features, neutral references, and critical coverage alike.

Media Mention Scanners

Media Mentions Scan (1 credit)Searches 50,000+ news outlets, trade publications, podcasts with transcripts, and broadcast archives. Returns all mentions within the past 5 years, sorted by publication authority and recency.
Sentiment Analysis LayerAutomatically applied to every mention. Classifies coverage as positive, neutral, negative, or mixed, and identifies the primary topic of each mention (achievement, controversy, opinion, expert commentary, etc.).

Sentiment analysis is powerful but imperfect. Sarcasm, irony, and highly technical industry coverage are the most common edge cases where automated classification goes wrong. For any mention that will inform a significant decision, such as preparing for a media interview, responding to a crisis, or assessing reputation risk, read the full article rather than relying solely on the sentiment label.

  • Positive mentions are evidence. Export and save them. They belong in your Evidence Hub as authority signals and can be referenced directly in your Reputation Report.
  • Negative mentions need context. One critical article from seven years ago is very different from a pattern of recent controversy. Look at both the volume and the recency of negative coverage.
  • Neutral mentions (name appears but you are not the focus) are still useful. They confirm that journalists and editors know who you are.
  • Set up Live Alerts (Premium/Platinum) to be notified of new media mentions in real time. Respond to positive coverage quickly; manage negative coverage before it gains momentum.
  • Run the Media Mentions Scan quarterly, and immediately following any public-facing event: a keynote, a product launch, a media appearance, or any incident that generated public discussion.

No Coverage Is Also a Signal

If the Media Mentions Scan returns zero results, that is meaningful data. In many industries, complete absence from the press signals limited market authority. If your goal is thought leadership, the gap between your current media presence and where you want to be is now clearly quantified and closeable.

Professional Network and Connection Analysis

Who you are connected to professionally is itself a reputation signal. A dense, high-quality professional network indicates industry standing, trustworthiness, and access. Sparse or low-quality connections can undermine an otherwise strong profile. The Professional Network Analysis scanner maps the strength, diversity, and visibility of your professional connections across linked platforms.

Professional Network Scan Details

Credit cost1 credit
What it analysesNetwork size and growth trajectory, connection quality (seniority distribution, industry diversity), endorsement patterns, mutual connections with influential accounts, and profile visibility score
Platforms coveredLinkedIn (primary), Twitter/X professional graph, GitHub contributor network (for technical professionals)
OutputNetwork strength score, gap analysis against your stated career goals, and a prioritised list of connection-building opportunities

The most actionable output from this scanner is the gap analysis. Based on your stated role, industry, and goals (from your profile and SAQ), the system identifies categories of connections that would most improve your network quality. For example: "You have strong peer connections but very few senior decision-makers in your target industry." That is a precise, actionable finding, not a vague recommendation to "grow your network".

  • Run this scanner after completing your full profile. The gap analysis improves dramatically with more complete goal and career data.
  • Treat the connection opportunity list as a prospecting queue, not a cold outreach mandate. The scanner identifies who would be valuable to know; your judgement determines how to approach the relationship.
  • Endorsement patterns matter. If you are endorsed heavily for skills that are not central to your current positioning, that misalignment shows up in how others perceive your expertise.
  • Re-run annually, or after a major career pivot, to see whether your network composition has shifted to match your new direction.

Privacy Note on Network Analysis

The Professional Network Analysis scanner only examines publicly available profile and connection data. It does not access private messages, hidden connections, or any data that requires platform-level authentication. The analysis reflects what is visible to any member of the public viewing your linked profiles.

4

Grow and Targeted Scanners

Once you have a clear defensive and discovery baseline, the Grow and Targeted scanners let you shift from reactive management to proactive strategy. Grow scanners measure how powerfully your expertise and authority register across the platforms and signals that matter most to your professional reputation. Targeted scanners are precision instruments. Deploy them when you have a specific, urgent question that the broader scans cannot answer directly.

Authority Building Scanners

Authority is the hardest element of reputation to build and the easiest to underestimate. People with genuine expertise often register as low-authority online simply because they have not structured their output in the ways that search engines, media outlets, and professional networks reward. The four Grow scanners measure your current authority signals and identify precisely where the gaps are.

Grow Category Scanners

Thought Leadership Scan (2 credits)Finds and evaluates all your published content: articles, white papers, guest posts, interviews, and podcast appearances, and scores each for authority signals: publication quality, engagement metrics, citation frequency, and topical relevance to your stated expertise.
Speaking and Events Scan (2 credits)Searches conference agendas, event websites, webinar archives, and panel listings for appearances as a speaker, panellist, or featured expert. Measures the authority tier of each event.
Citation and Reference Scan (2 credits)Finds instances where others cite you, quote you, or reference your work: in articles, academic papers, reports, and podcasts. Citation by others is the strongest third-party authority signal available.
Expert Credentials Scan (2 credits)Cross-references your stated qualifications, certifications, and professional memberships against publicly verifiable registries. Confirms credential authenticity and checks for verification gaps on your public profiles.

The Thought Leadership Scan is most revealing when run on its full multi-year window rather than a recent-only filter. Seeing the arc of your published output, which topics you have covered, how engagement has changed, and where your credibility clusters, often clarifying what your genuine area of authority is. Many professionals discover that their actual recognised expertise differs from the expertise they think they are known for.

  • Run all four Grow scanners as a set at least once. The combined picture is more valuable than any single scanner in isolation.
  • Low Thought Leadership scores with high Citation scores suggest that others value your ideas more than your personal publishing output. This often indicates you are an ideas source who should be publishing more under your own name.
  • High Speaking scores with low Citation scores means you are visible at events but your ideas are not spreading in written form. Consider turning your talks into articles.
  • Expert Credentials scan results feed directly into your Trust Passport, which is a shareable proof-of-credentials document available to all plan tiers.

Authority Is Cumulative

Do not be discouraged by low initial Grow scores. Authority builds slowly and compounds. Run these scanners now to establish a baseline, then re-run them every 6 months. Watching the scores move over time as you publish, speak, and earn citations is one of the most motivating signals the platform provides.

Brand Consistency Checks

Inconsistency is a silent reputation killer. When your job title on LinkedIn says one thing, your company bio says another, and your Twitter profile has not been updated since 2019, every version is diluting the clarity of who you are. Recruiters, journalists, and potential partners often encounter multiple versions of your profile and draw negative conclusions, not because the information is wrong, but because it is contradictory.

Brand Consistency Scan Details

Credit cost2 credits
What it checksName spelling and formatting, job title and role description, employer and dates, professional headline, profile photos (different vs the same), bio consistency, contact information, linked URLs
Platforms checkedLinkedIn, Twitter/X, GitHub, personal website, company website bio page, Crunchbase, AngelList, professional association directories, business listing platforms
Output formatField-by-field comparison table with inconsistencies highlighted in red, amber for minor variations, and green for consistent fields. Recommended correction for each inconsistency.
  1. 1Run this scan before any major professional event: a job search, a fundraising round, a public speaking engagement, or a media opportunity.
  2. 2Start corrections with the highest-visibility fields: name format, current title, and profile photo consistency. These are the fields people check first.
  3. 3Amber inconsistencies (minor variations) matter more than they appear to. "Managing Director" vs "MD" vs "Managing Dir." reads as sloppiness to detail-oriented decision-makers.
  4. 4After correcting profiles, allow 48 to 72 hours for search engine caches to update, then re-run the scan to confirm corrections have propagated.
  5. 5Include your professional email address in the consistency check. Using different email domains across platforms, such as personal Gmail versus company email, creates an impression of disorganisation.

The Photo Problem

Profile photo inconsistency is the single most common brand consistency failure. Using different photos across platforms, or worse, no photo on some and a photo on others, makes you harder to recognise and reduces the sense of a coherent professional identity. Choose one high-quality, professional photo and use it everywhere.

Targeted Investigation Scanners

The three Targeted scanners are not routine tools. They are deployed in response to specific concerns. You would not run a Deepfake Detection scan every month any more than you would call a lawyer every month. But when the concern arises, the Targeted scanners provide intelligence you cannot get from any other scanner in the library. They cost more credits and take longer because they go significantly deeper.

Targeted Investigation Scanners

Reverse Image Search Scan (3 credits)Finds every instance where your photos appear online, including sites that did not credit you, content that has been cropped or edited, and usage on platforms you are not aware of. Searches across 30+ image indexing services simultaneously.
Deepfake and Impersonation Detection Scan (3 credits)Scans for synthetic media, including AI-generated images or video featuring your likeness, fake social media accounts using your name or photo, and impersonation attempts on professional platforms.
Single Platform Deep Scan (3 credits)Focuses the full scanning capacity on one platform of your choice: Reddit, X/Twitter, Glassdoor, public review platforms, a specific forum, or any public platform. Returns the complete picture of how you or your professional brand appears on that single platform.

The Deepfake and Impersonation Detection Scan has become increasingly important as AI-generated content has become indistinguishable from genuine photography. Public figures, executives, and anyone with a meaningful social following are now realistic targets for synthetic media attacks. Running this scan once per year, and immediately if you receive reports of suspicious content, is a minimum precaution for anyone with public-facing responsibilities.

  • Deploy the Reverse Image Search Scan when you want to protect your personal brand photography, or when you notice images appearing in unexpected places.
  • Use the Single Platform Deep Scan when you know a specific platform is a reputation risk. For example, if colleagues mention that someone is discussing you on a specific forum, or if reviews on a particular site are affecting business.
  • If the Deepfake Detection Scan returns positive results, document everything immediately (screenshots with timestamps) and consult the Crisis Management module in your AI Reputation Coach before taking public action.
  • Targeted scans are available to Premium and Platinum users. Free users who need targeted scanning can purchase a one-time credit pack.

Responding to Impersonation

If the Impersonation Detection Scan finds a fake account using your name or image, do not engage with it publicly before taking evidence. Screenshot the full profile, copy the URL, note the follower count and post history, and then report through the platform's official channels. Engaging publicly with impersonation accounts often amplifies their visibility. Document first, report second, respond publicly only if necessary.

Inside Reputation Scorecard

Narratives IntelligencePremium

Narratives Intelligence uses scanner results to identify the strongest themes for your professional story. Scan data becomes narrative fuel.

5

Scanner Decision Framework

With 18 scanners available, the hardest question is often: where do I start, and what do I run next? The answer depends on three variables: your role and industry, your current risk profile, and your available credits. This chapter gives you a concrete decision framework, not a generic recommendation to "run everything", so you leave every scanning session with clear results, clear next actions, and credits left over for your next cycle.

Priority Matrix: Role and Risk Profile

Different professionals have different vulnerability profiles. A C-suite executive faces background check scrutiny and media coverage risk. A freelance professional faces visibility and authority gaps. A public-sector professional faces regulatory compliance risks. The priority matrix below maps your role to the scanners that deliver the highest return per credit for your specific situation.

Priority Matrix by Role

Executive / Board MemberPriority 1: Professional Records Scan, Media Adverse Coverage Scan. Priority 2: Digital Footprint Scan, Thought Leadership Scan. Priority 3: Deepfake Detection Scan. Rationale: Due diligence scrutiny is intense; adverse records and negative coverage are immediate disqualifiers.
Entrepreneur / FounderPriority 1: Digital Footprint Scan, Credential Breach Scan. Priority 2: Citation and Reference Scan, Media Mentions Scan. Priority 3: Brand Consistency Check. Rationale: Investors and partners search for founders obsessively; digital footprint and authority signals are primary evaluation criteria.
Senior Professional (non-executive)Priority 1: Digital Footprint Scan, Brand Consistency Check. Priority 2: Thought Leadership Scan, Professional Network Analysis. Priority 3: Credential Breach Scan. Rationale: Career advancement depends on visibility and consistent positioning.
Freelance / ConsultantPriority 1: Digital Footprint Scan, Thought Leadership Scan. Priority 2: Media Mentions Scan, Expert Credentials Scan. Priority 3: Brand Consistency Check. Rationale: Clients buy expertise and track record; authority and content signals are the primary trust signals.
Public Figure / Content CreatorPriority 1: Reverse Image Search Scan, Deepfake Detection Scan. Priority 2: Media Mentions Scan, Digital Footprint Scan. Priority 3: Data Broker Exposure Scan. Rationale: Image misuse and impersonation are high-probability risks; public profile means higher privacy stakes.
Financial / Legal / Healthcare ProfessionalPriority 1: Professional Records Scan, Expert Credentials Scan. Priority 2: Media Adverse Coverage Scan, Credential Breach Scan. Priority 3: Digital Footprint Scan. Rationale: Regulated professions face regulatory records exposure and strict credential verification requirements.

Risk events override the standard priority matrix. Whenever a triggering event occurs, such as a public dispute, a job transition, a significant public appearance, or a data breach notification from any service, re-prioritise using the event-based scan list below, regardless of your role category.

Event-Based Scan Triggers

Starting a new job or contractRun: Professional Records Scan + Digital Footprint Scan + Brand Consistency Check
Launching a business or productRun: Digital Footprint Scan + Media Mentions Scan + Credential Breach Scan
Public controversy or negative pressRun: Media Adverse Coverage Scan + Single Platform Deep Scan + Digital Footprint Scan
Receiving a data breach notificationRun: Credential Breach Scan + Dark Web Exposure Scan + Data Broker Exposure Scan
Preparing for media interview or major speechRun: Media Mentions Scan + Thought Leadership Scan + Brand Consistency Check
Suspected impersonation or image misuseRun: Deepfake Detection Scan + Reverse Image Search Scan + Single Platform Deep Scan

Build a Quarterly Scan Schedule

The most effective users do not scan reactively. They maintain a quarterly rhythm. Choose 3 to 5 scanners to run every quarter based on your role priority matrix. Reserve 2 to 3 credits per quarter for reactive scans triggered by unexpected events. Treat it like a quarterly financial review: routine, scheduled, and non-negotiable.

The Scan, Interpret, Act Loop

Running a scanner is step one. The value is in what you do with the results. The Scan, Interpret, Act loop is a three-step process for turning raw scanner output into concrete reputation improvement. Skipping any step reduces the return on every credit you spend.

  1. 1Scan: Run the scanner. Wait for results. Do not pre-empt or assume. Let the data come back before forming any conclusions. If results take longer than expected, do not re-run. Check your notification settings instead.
  2. 2Interpret: Open your Evidence Hub and filter to the most recent scan results. Read every item in the high-confidence category. For low-confidence items, click through to the source and verify manually. Classify each result as: (a) confirms something positive to amplify, (b) reveals something neutral to monitor, (c) identifies something negative to address, or (d) is irrelevant or a false positive to dismiss.
  3. 3Act: For each result you classified as (a): add it to your Narratives Intelligence as supporting evidence. For (b): set a monitor alert if it is from a high-visibility source. For (c): open a Mission in the AI Coaching module. The coach will generate a specific action plan for the finding. For (d): dismiss the item in the Evidence Hub to keep your workspace clean. Do not skip the dismiss step; cluttered Evidence Hubs make future interpretation harder.

Common Interpretation Mistakes to Avoid

Over-reacting to a single negative resultOne old negative article does not define your reputation. Context matters. Look at volume, recency, and source authority before deciding how much energy to invest in addressing it.
Ignoring low-confidence results entirelyLow-confidence means the AI is uncertain, not that the result is unimportant. A legitimate but unusual result (your name on a document you forgot you signed, for example) can be low-confidence. Always click through.
Treating scanner results as final truthScanner results are intelligence inputs, not verdicts. They require your contextual knowledge to interpret correctly. You know things about your own history that the scanner cannot know.
Running a scan and taking no actionInsight without action is the most common wasted pattern. Commit to completing at least one action per scan result before running your next scan.

The Act phase does not need to be completed in the same session as the scan. Complex findings, particularly in the Protect category, may require research, professional advice, or time-sensitive platform actions. Use the Evidence Hub's "action queue" tag to mark items you intend to address, so they remain visible in your next session without cluttering the main results view.

Use AI Missions to Close the Loop

Every scanner result that needs action can be sent directly to the Missions module with one click. The AI Reputation Coach will generate a tailored action plan with specific steps, suggested timelines, and expected score impact for that exact finding. This turns the Act phase from an open-ended task into a structured checklist.

Credit Budgeting Strategies by Plan

Getting maximum value from your credits requires intentional allocation, not just running whichever scanner catches your attention. Below are recommended quarterly budgets for each plan tier, designed to deliver comprehensive coverage without exhausting credits before the replenishment cycle.

Free Plan: 5 Credits per Month (15 per Quarter)

Month 1 allocation3 credits: Digital Footprint Scan (1) + Media Mentions Scan (1) + Professional Network Analysis (1). Goal: establish your baseline across all three Discover dimensions.
Month 2 allocation3 credits: Credential Breach Scan (2) + Digital Footprint Scan re-run if any changes made (1). Goal: close the most urgent Protect gap.
Month 3 allocation4 credits: Brand Consistency Check (2) + Thought Leadership Scan (2). Goal: begin building authority baseline. Save 1 credit as buffer for reactive needs.
Free plan strategic noteFocus on Discover scanners (1 credit each) to maximise the number of baseline data points. Upgrade to Premium when your Evidence Hub is full and you are ready to act on Protect findings.

Premium Plan: 30 Credits per Month (90 per Quarter)

Routine quarterly allocation (70 credits)Digital Footprint Scan (1) + Media Mentions Scan (1) + Professional Network Analysis (1) + Credential Breach Scan (2) + Data Broker Exposure Scan (2) + Brand Consistency Check (2) + Thought Leadership Scan (2) + Speaking and Events Scan (2) + Citation and Reference Scan (2) + Expert Credentials Scan (2). Total: 17 credits for a comprehensive full-library run.
Re-run budget (30 credits)Run the scanners most relevant to your active goals 2 to 3 additional times during the quarter. If you are actively publishing, re-run Thought Leadership. If you have cleaned up data brokers, re-run Data Broker Exposure to verify removals.
Reactive reserve (20 credits)Hold back 20 credits per quarter for event-triggered scans. If nothing triggers them, roll them into the next quarter's routine budget.

Platinum Plan: Unlimited Standard Scans

Standard scan strategyRun all Discover, Protect, and Grow scanners monthly. With unlimited standard credits, there is no reason to restrict frequency. More data means better trending analytics and more accurate Mission recommendations.
Targeted scanner cadenceTargeted scanners (3 credits each) are included in Platinum but still benefit from strategic scheduling. Run Deepfake Detection and Reverse Image Search quarterly. Deploy Single Platform Deep Scan reactively when a specific platform concern arises.
Platinum power moveUse the monthly scan cadence to generate quarter-over-quarter trend data. Your Trending Analytics dashboard (exclusive to Platinum) becomes more powerful with each monthly data point, showing velocity of reputation change, not just current state.
  • Credits earned through profile completion (up to 8 bonus credits) count toward your monthly allocation and should be claimed before running paid scans.
  • If you are approaching the end of a billing month with unused credits, prioritise running the higher-cost scanners (Protect and Grow at 2 credits) rather than cheaper Discover scans. The per-credit value is higher for the more expensive scanners.
  • On any plan, buying a 10-credit top-up pack is more economical than upgrading to the next tier just to run one or two additional scans. Reserve tier upgrades for when you need sustained access, not occasional extra capacity.
  • Track your credit usage in the Account section of your dashboard. A clear view of what you have spent and on what scanners helps you refine your quarterly budget each cycle.

The Single Best Credit Investment

If you only ever run one scanner, make it the Digital Footprint Scan. At 1 credit, it delivers the broadest possible view of your online presence, anchors all subsequent scanning decisions, and provides an immediate, actionable inventory of what exists, what is working, and what needs attention. Everything else builds from that foundation.

Credit budgeting is not a set-and-forget exercise. Revisit your allocation each quarter in light of what you found the previous quarter. If the Protect scanners returned clean results two quarters in a row, you can safely reduce their frequency. If the Thought Leadership Scan keeps surfacing gaps, increase its allocation until those gaps close. The framework is a starting point; your results data should refine it over time.

Inside Reputation Scorecard

AI Reputation CoachPlatinum

The AI Coach recommends which scanners to run next based on your current score profile, evidence gaps, and professional goals. Strategic scanning, not guesswork.

Ready to take action?

Your reputation score is waiting. Free assessment, real results.

GDPR Compliant
SOC 2 Type II
Post-Quantum Cryptography
ISO 42001