The Rise of Sextortion and Prevention on Valentine's Day

The Rise of Sextortion and Prevention on Valentine's Day

Valentine's Day, universally celebrated as an occasion of love and togetherness, paradoxically also opens up avenues for cybercriminals to exploit the very essence of human vulnerability—our need for affection and connection. In the digital age, the intertwining of love and technology while creating spaces for new forms of companionship has also given rise to a sinister phenomenon: sextortion. This malicious practice, escalating alarmingly in recent years, has transformed Valentine's Day from a purely romantic celebration to a time of increased vigilance and caution.

The Dark Side of Digital Romance

The digital revolution has undoubtedly brought people closer, enabling instant communication and the sharing of personal moments at the click of a button. However, this revolution comes with a dark side. Sextortion, a severe and escalating threat, manipulates the intimacy of relationships, exploiting trust and affection for nefarious purposes. It represents a profound betrayal of trust, where perpetrators, often masquerading as potential romantic partners or exploiting existing relationships, coerce victims into providing explicit images or favors under the threat of public exposure or harm. This manipulation is not just a violation of privacy; it's a form of digital assault that can lead to long-lasting psychological trauma.

Sextortion: A Gateway to Human Trafficking

Sextortion's repercussions extend beyond the immediate emotional and psychological harm to victims. It acts as a conduit to more heinous crimes, particularly human trafficking. By leveraging stolen or coerced intimate content, perpetrators seek not only monetary gain but also control and domination, pushing victims into corners from which they see no escape. This digital coercion can escalate into physical exploitation, where victims are trafficked for sexual purposes, labor, or other forms of involuntary servitude. The transition from digital extortion to human trafficking is facilitated by the anonymity and reach of the internet, allowing criminals to operate and exploit with impunity across international borders.

The Global Impact and the Need for Vigilance

The rise of sextortion highlights a disturbing trend in the misuse of digital platforms for exploitation and abuse. Its global impact is significant, affecting individuals regardless of age, gender, or socioeconomic status. The internet's anonymity, far from being a tool for freedom and expression, has become a weapon that emboldens perpetrators of sextortion and human trafficking. On occasions like Valentine's Day, when the sharing of intimate materials may be more prevalent, the risk of falling victim to these crimes increases. It is a stark reminder of the need to approach online interactions with caution, to protect personal information, and to be aware of the signs of manipulative or coercive behavior.

Love in the Time of Digital Caution

As we navigate the complexities of love in the digital age, Valentine's Day serves as a reminder of the dual nature of our online lives. While celebrating love and connection, we must also guard against the threats that lurk in the shadows of our digital interactions. Awareness, education, and caution are our best defenses against the dark side of digital romance. By fostering safe online environments and supporting victims, we can reclaim the internet as a space of genuine connection and affection. This Valentine's Day, let's remember that true love respects boundaries, values consent, and champions the dignity of every individual.

10 Ways to Prevent Sextortion in Your Family or Workplace

1. Educate Yourself and Others

Understand what sextortion is, how it happens, and its consequences. Educate your family and colleagues about the dangers and signs of sextortion.

Understanding Sextortion

  • Definition: Begin by clarifying what sextortion is—a form of sexual exploitation that involves the threat of distributing private and sensitive material unless the victim meets the demands of the perpetrator, often for sexual favors, money, or other goods.
  • Mechanisms: Explain how sextortion typically occurs, including through online platforms, social media, emails, or messaging apps, where perpetrators might use deception, hacking, or social engineering to obtain sensitive material.
  • Consequences: Discuss the emotional, psychological, and sometimes physical impact on victims. This includes stress, anxiety, depression, and in severe cases, suicidal thoughts or actions.

Educating Family and Colleagues

  • Open Discussions: Create an environment where family and colleagues can discuss digital safety openly. This includes talking about the importance of privacy settings, the risks of sharing personal information online, and the potential dangers of interacting with strangers on the internet.
  • Recognizing Signs: Teach them to recognize signs of sextortion, such as sudden changes in behavior, withdrawal from social activities, signs of anxiety or depression, or mentions of compromising situations online.
  • Safe Practices Online: Encourage the use of strong, unique passwords, the importance of two-factor authentication, and being cautious about what is shared online. Stress the importance of not sending compromising images or information, even to people they trust.

Prevention Strategies

  • Critical Thinking Online: Instill a sense of critical thinking when engaging online. Teach them to question the authenticity of unsolicited messages or friend requests, and the motives behind them.
  • Privacy Settings: Guide them through the process of securing their online profiles and accounts with appropriate privacy settings to limit who can see their information and posts.
  • Use of Technology: Promote the use of security software, including antivirus and anti-malware programs, to protect devices from unauthorized access.

Response Tactics

  • Reporting Mechanisms: Educate them on how to respond if they or someone they know becomes a victim of sextortion. This includes not complying with the demands, saving evidence of the extortion, and reporting the incident to the authorities or a trusted adult.
  • Support Systems: Highlight the importance of seeking support, whether through counseling, support groups, or trusted individuals, to cope with the emotional distress caused by sextortion.

Resources and Assistance

  • Provide Resources: Share resources such as websites, hotlines, and organizations that specialize in online safety and can offer assistance and advice in cases of sextortion.
  • Continuous Education: Keep the conversation going by staying informed about the latest trends in online exploitation and sharing this knowledge with your family and colleagues. Encourage them to do the same, fostering a culture of awareness and prevention.

Educating yourself and others about sextortion is an ongoing process that requires vigilance, openness, and a proactive approach to digital safety. By spreading awareness and providing the tools and knowledge to recognize and respond to threats, you can help protect yourself and those around you from becoming victims of sextortion.

2. Practice Safe Online Behavior

Be cautious about what you share online. Think twice before sending intimate photos or information, even to someone you trust.

Mindful Sharing

  • Personal Information: Exercise caution with the amount and type of personal information shared online. This includes addresses, phone numbers, and details about your daily routine.
  • Intimate Content: Be especially wary of sharing intimate photos or information. Remember that once something is shared digitally, control over who sees it and how it is used can be lost forever.
  • Trust Considerations: Even if you trust the recipient, consider the long-term implications. Relationships can change, and personal content can be used maliciously in the future.

Secure Communications

  • Encryption: Use messaging apps and platforms that offer end-to-end encryption to protect the privacy of your conversations.
  • Password Protection: Ensure that any sensitive content stored digitally is secured with strong, unique passwords or, better yet, not stored digitally at all.
  • Phishing Awareness: Be vigilant about phishing attempts, where scammers may try to trick you into giving away personal information or accessing your devices.

Privacy Settings

  • Social Media: Regularly review and adjust your social media privacy settings to control who can see your posts, photos, and profile information.
  • Account Security: Enable two-factor authentication (2FA) on all accounts where possible to add an extra layer of security beyond just a password.
  • Digital Footprint: Be aware of your digital footprint—what personal information is available about you online and how it could be used by others.

Critical Thinking Online

  • Question Motives: When someone you know online but not in person asks for personal information or photos, question their motives. Why do they need it? What could they do with it?
  • Verify Identities: Be cautious of catfishing, where individuals create fake profiles to deceive others. Verify the identities of people you interact with online, especially if the relationship progresses quickly or if they

3. Use Strong, Unique Passwords

In the digital age, the strength and uniqueness of your passwords are your first line of defense against cyber threats like sextortion. As we navigate through numerous online platforms, from social media to banking sites, the security of our personal and sensitive information hinges on the robustness of our passwords. Here's a deeper dive into why strong, unique passwords are crucial and how they can be effectively implemented:

The Importance of Strong Passwords

A strong password acts as a formidable barrier between cybercriminals and your personal information. It should be complex enough to resist attempts at decryption, whether through brute force attacks (where attackers try to guess every possible password combination) or through more sophisticated methods. A strong password typically includes a mix of the following elements:

  • Upper and lowercase letters
  • Numbers
  • Special characters (such as !, @, #, etc.)

This complexity makes your password harder to crack, significantly reducing the risk of unauthorized access to your accounts.

The Need for Uniqueness

Using the same password across multiple accounts is akin to having a single key for every lock in your house. If a cybercriminal manages to decipher your password for one account, they potentially gain access to all your other accounts. Therefore, it's crucial to use unique passwords for each account to compartmentalize risks. Should one account be compromised, it won't automatically endanger the others.

Implementing Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security by requiring a second form of verification beyond just the password. This can be something you know (a password or a PIN), something you have (a smartphone or a security token), or something you are (biometric verification like a fingerprint or facial recognition). Even if a cybercriminal obtains your password, without the second factor, they can't access your account. Enabling 2FA wherever possible greatly enhances your security posture.

Strategies for Managing Strong, Unique Passwords

Remembering a different, complex password for each account can be daunting. Here are some strategies to manage them effectively:

  • Use a Password Manager: Password managers securely store your passwords and often include password generation tools to create strong, unique passwords for each of your accounts.
  • Adopt Passphrases: Consider using long, complex phrases known only to you as passwords. They can be easier to remember and just as secure if sufficiently lengthy and unique.
  • Regular Updates: Periodically update your passwords, especially for accounts holding sensitive personal or financial information. While frequent changes aren't always necessary, doing so can preempt breaches, especially after reports of security incidents.

4. Check Privacy Settings

In the interconnected world of social media, maintaining control over your personal information is crucial for safeguarding your privacy and security. Regularly reviewing and adjusting your privacy settings across various platforms can significantly mitigate the risk of unwanted exposure and potential sextortion. Here's an in-depth look at why this practice is important and how to effectively manage your privacy settings:

The Importance of Privacy Settings

Privacy settings are tools provided by social media platforms that allow you to control who can see your posts, personal information, and even who can contact you. These settings are your digital boundaries, dictating the visibility of your online activities to friends, followers, and the public. Properly configured privacy settings can:

  • Prevent strangers or potential sextortionists from accessing personal information that could be used against you.
  • Limit the audience for your posts, photos, and videos to those you trust.
  • Control how people can find and contact you on these platforms.

How to Regularly Check and Adjust Privacy Settings

Stay Informed About Updates: Social media platforms frequently update their privacy policies and settings. Stay informed about these changes to understand how they may affect your privacy.

Conduct Regular Reviews: Make it a habit to review your privacy settings regularly—at least every few months or whenever you notice changes in the platform’s privacy options.

Customize Your Settings: Most platforms offer granular privacy controls. Take the time to go through these settings and customize them to suit your comfort level with information sharing. This includes:

  • Adjusting who can see your future and past posts.
  • Managing the visibility of your profile information, such as email addresses, phone numbers, and birthdates.
  • Configuring settings for tagging, location sharing, and facial recognition (where applicable).

Be Mindful of Third-Party Access: Many social media platforms allow third-party apps to access your information. Regularly review and remove any apps or services that you no longer use or trust.

Enable Extra Security Features: Look for additional security features beyond privacy settings, such as alerts about unrecognized logins and options for reviewing posts you're tagged in before they appear on your timeline.

The Role of Privacy in Preventing Sextortion

By tightly controlling who can see and interact with your online content, you reduce the risk of your personal information being misused for sextortion. Cybercriminals or potential sextortionists rely on gathering personal data to manipulate or threaten their targets. Limiting this access through careful management of your privacy settings acts as a preventive barrier against such threats.

Privacy settings are a powerful tool in maintaining control over your digital footprint on social media. By regularly reviewing and adjusting these settings, you not only protect your personal information from being misused but also take a proactive step in preventing sextortion and other forms of online exploitation. In the era of digital communication, being vigilant about your privacy settings is as crucial as locking your doors in the physical world.

5. Be Skeptical of Unknown Contacts

Be wary of unsolicited messages or friend requests from strangers. Sext

ortionists often use fake profiles to gain trust and extract personal information. In the digital landscape, where connections are often made without face-to-face interaction, the skepticism towards unknown contacts serves as a critical defense mechanism against various online threats, including sextortion. Unsolicited messages and friend requests from strangers can be the first step in a perpetrator's strategy to gain trust and access personal information. Here's a closer look at why caution is necessary and how to approach these unsolicited digital interactions.

Understanding the Threat

Sextortionists and other cybercriminals frequently create fake profiles, presenting themselves as someone else, often with appealing personas designed to quickly gain trust. These profiles can appear very convincing, complete with detailed backstories, stolen pictures, and fabricated social circles. The initial interaction may seem harmless or even flattering, but the underlying intent is to manipulate or deceive.

Identifying Suspicious Contacts

Profile Examination: A thorough examination of the profile can sometimes reveal inconsistencies or signs that the account is fake. Look for a limited number of posts, few genuine interactions with others, or a recent creation date.

Generic Messages: Be cautious of messages that seem generic or copy-pasted, often a sign of a phishing attempt or scam.

Rapid Escalation: Be wary if the person quickly moves to personal topics or requests intimate information or images. Legitimate connections usually develop more naturally.

Request for Personal Information: Any request for personal information, financial details, or passwords should be viewed with extreme suspicion.

Protective Measures

Privacy Settings: Adjust your privacy settings to limit who can send friend requests or messages. This can significantly reduce unsolicited contact.

Verification: If you're unsure about a person's identity but are inclined to respond, try verifying their identity through other means. This could involve asking mutual contacts about the person or using search engines and social media to find corroborating information.

Report and Block: Don't hesitate to block or report profiles that seem suspicious. Social media platforms have mechanisms in place to deal with fake profiles and harassment.

Educate Yourself and Others: Awareness of the tactics used by sextortionists and scammers can help you and your circle stay safe. Share information about suspicious interactions to help protect others in your network.

Skepticism towards unknown contacts is not about fostering an environment of distrust online but about protecting oneself in a landscape where anonymity can easily be exploited. By being vigilant and taking proactive steps to verify the authenticity of those we interact with online, we can significantly reduce the risk of falling victim to sextortion and other forms of cyber exploitation. In the digital age, where relationships and interactions extend beyond physical boundaries, a cautious approach to online connections is both wise and necessary.

6. Keep Personal Information Private

Limit the amount of personal information you share online. Information such as your address, phone number, or workplace can be used by sextortionists to manipulate or threaten you. In an era where sharing has become synonymous with social interaction, the importance of keeping personal information private cannot be overstated. The digital footprint we leave behind can be a goldmine for sextortionists and other malicious actors looking to manipulate or threaten individuals. Here's an expanded view on the significance of privacy and strategies for safeguarding personal information online.

The Risks of Oversharing

Every piece of personal information shared online increases your vulnerability to cyber threats. Information as basic as your address, phone number, or workplace details can be weaponized by sextortionists. They could use this data to build trust, pretend to have a connection with you, or even threaten to contact people you know. In more severe cases, such information can lead to physical stalking, harassment, or worse.

Strategies for Protecting Your Information

Think Before You Share: Adopt a cautious approach to sharing information online. Ask yourself if it's necessary to share specific details publicly, such as your location, contact information, or details about your family and friends.

Adjust Privacy Settings: Social media platforms offer various privacy settings that allow you to control who sees your information. Ensure these settings are configured to limit the visibility of your personal information to trusted individuals only.

Be Mindful of Social Engineering: Sextortionists often use social engineering tactics to extract personal information. They might pose as someone from a legitimate organization or a person in need. Always verify the identity of the person you're communicating with before divulging any personal information.

Secure Your Accounts: Use strong, unique passwords for each of your online accounts and enable two-factor authentication where possible. This makes it harder for cybercriminals to gain unauthorized access to your information.

Regularly Review Your Digital Footprint: Periodically search for your name and other personal details online to see what information is publicly available about you. This can help you identify and remove sensitive information that you don't want to be accessible.

Educate Friends and Family: Encourage your social circle to adopt similar privacy practices, especially in how they share information involving you. Photos or posts they share can inadvertently expose your personal information.

The Role of Anonymity in Protection

While complete anonymity online is challenging to achieve, maintaining a level of ambiguity about your personal life can be a powerful deterrent against sextortion. Use only your first name or a nickname where full identification isn't necessary, and avoid posting photos that reveal your location or personal habits.

Keeping personal information private is a critical component of your online security strategy. In the fight against sextortion and other forms of cyber exploitation, a cautious approach to what you share and with whom can significantly reduce your risk of becoming a target. By implementing these strategies, you can enjoy the benefits of online connectivity without sacrificing your privacy and safety.

7. Encourage Open Communication

Foster an environment, whether at home or in the workplace, where family members or employees feel comfortable discussing concerns about suspicious interactions or online safety. Open communication is a cornerstone of effective prevention and response strategies against online threats like sextortion. By fostering an environment where individuals feel comfortable sharing their experiences and concerns, families and organizations can create a supportive network that detects, mitigates, and responds to potential dangers. Here's a closer look at the importance of open communication and how to cultivate it both at home and in the workplace.

Building a Culture of Trust and Support

At Home: Within families, open communication ensures that members, especially younger ones who may be more vulnerable to online exploitation, understand the risks and feel safe discussing any online interactions that make them uncomfortable. Parents and guardians can lead by example, sharing their own experiences and concerns about online safety, demonstrating that it's a priority for everyone.

  • Regular Conversations: Incorporate discussions about online safety into regular family conversations. Use news stories or hypothetical scenarios as conversation starters to discuss how to handle suspicious online interactions.
  • Create a Non-judgmental Space: Emphasize that family members can come forward with any concerns without fear of punishment or judgment. The focus should be on solving the problem together, not on assigning blame.

In the Workplace: For organizations, open communication about online safety can protect both the employees and the company. Encouraging employees to report suspicious interactions helps in early detection of potential threats and prevents escalation.

  • Training and Awareness Programs: Implement regular training sessions to educate employees about the latest online threats and safe practices. Make it clear that the company views the protection of personal and corporate data as a shared responsibility.
  • Establish Clear Reporting Protocols: Ensure that employees know how and to whom they should report suspicious online interactions. Having a dedicated point of contact for these concerns can streamline the response process.

Empowering Individuals

Empowerment through knowledge is a critical aspect of fostering open communication. When individuals understand the risks and know how to protect themselves, they're more likely to speak up about their concerns.

  • Resources and Support: Provide access to resources that offer advice and support on dealing with online threats. This could include links to expert advice, helplines, or internal support structures within the organization.
  • Encourage Peer Support: Create forums or support groups where individuals can share their experiences and strategies for dealing with online threats. Peer support can be incredibly powerful in normalizing the conversation about online safety.

The Impact of Open Communication

The benefits of encouraging open communication extend beyond the immediate prevention of sextortion and other cyber threats. It builds a culture of mutual support and vigilance, where individuals are more aware of the risks and more proactive in their own defense. In the long run, it contributes to a safer online environment for everyone involved.

Encouraging open communication about suspicious interactions and online safety creates a supportive framework that can significantly reduce the impact of cyber threats like sextortion. By fostering trust, providing education, and establishing clear protocols, both families and organizations can protect their members and create a culture of shared responsibility toward online safety.

8. Report Suspicious Activity

If you encounter or become the victim of sextortion, report it to local law enforcement or a relevant cybercrime unit immediately. Silence only empowers the perpetrators. Reporting suspicious activity is a critical step in combating sextortion and other forms of online exploitation. When individuals take action by reporting these incidents, they not only protect themselves but also contribute to broader efforts to combat cybercrime. Understanding the importance of reporting, knowing when and how to do so, and recognizing the impact of taking action are key components of an effective defense against online threats.

The Importance of Reporting Sextortion

Deterrence: Reporting acts of sextortion helps law enforcement agencies track and apprehend perpetrators, serving as a deterrent to others who might engage in similar activities.

Prevention: Each report contributes to a larger understanding of how sextortionists operate, enabling authorities and cybersecurity experts to develop better prevention strategies and tools.

Support and Resources: Victims who report sextortion can access legal and psychological support services, helping them to recover from the incident. Authorities or specialized organizations can provide guidance and support to navigate the aftermath of sextortion.

When and How to Report

Immediate Action: If you suspect you're a victim of sextortion, report the incident as soon as possible. Early reporting increases the chances of identifying and apprehending the perpetrator.

Gather Evidence: Collect and preserve any evidence related to the sextortion attempt, including screenshots of messages, email addresses, social media profiles, and transaction details if money was demanded or paid. This information is crucial for investigations.

Contact Authorities: Reach out to local law enforcement or a national cybercrime unit. Many countries have dedicated units for handling cybercrimes, including sextortion.

Online Platforms: Report the incident to the platform where the interaction occurred. Social media networks, messaging apps, and websites have mechanisms for reporting abuse and can take action to remove content or suspend accounts.

Cybercrime Agencies: Consider reporting the incident to national or international cybercrime agencies. Organizations like the Internet Crime Complaint Center (IC3) in the United States or the European Cybercrime Centre (Europol) accept reports of cybercrime, including sextortion.

Overcoming Reluctance to Report

Many victims of sextortion hesitate to report the crime due to feelings of shame, fear of judgment, or concern about privacy. It's essential to recognize that sextortionists rely on this silence to continue their exploitation. Law enforcement agencies and support organizations are equipped to handle these situations with sensitivity and confidentiality. Reporting can be a critical step in reclaiming control and preventing further victimization.

The Impact of Reporting

By reporting sextortion, victims empower themselves and others. Each report not only aids in the personal recovery process but also contributes to a collective effort against cybercriminals. Reporting helps build a safer online environment by ensuring that perpetrators are held accountable for their actions.

Reporting suspicious activity, especially in cases of sextortion, is a vital action that supports both personal recovery and the global fight against cybercrime. Silence benefits only the perpetrators. By coming forward and reporting sextortion, individuals play a crucial role in deterring criminal activities, aiding in the development of prevention strategies, and securing the online landscape for everyone.

9. Use Technology Wisely

Install and regularly update security software on your devices. Use tools that can help protect your privacy and security online. In an age where our lives are increasingly digital, using technology wisely is essential for safeguarding our privacy and security online. This means being proactive about the tools and practices we adopt to protect our digital footprint from threats like sextortion. Here’s how to approach this:

Install and Regularly Update Security Software

Comprehensive Protection: Choose security software that offers comprehensive protection, including antivirus, anti-malware, and firewall capabilities. This software acts as the first line of defense against malicious attacks that could compromise your personal information.

Regular Updates: Cyber threats are constantly evolving, and so is the software designed to combat them. Regularly updating your security software ensures you are protected against the latest threats. Enable automatic updates to ensure you’re always using the most current version.

Use Privacy Tools

VPN Services: A Virtual Private Network (VPN) encrypts your internet connection, protecting your online activities from eavesdropping. Use a VPN when accessing public Wi-Fi networks to prevent attackers from intercepting sensitive information.

Secure Browsers and Extensions: Consider using web browsers known for prioritizing user privacy and security. Additionally, browser extensions can enhance privacy by blocking trackers, ads, and suspicious websites.

Encrypted Communication: Opt for messaging apps and email services that offer end-to-end encryption to protect the content of your communications from potential interception.

Be Mindful of App Permissions

Review Permissions: Regularly review the permissions you’ve granted to apps on your devices. Limit these permissions to only what is necessary for the app to function to minimize data exposure.

Educate Yourself on Secure Practices

Stay Informed: Keep abreast of the latest in cybersecurity threats and protective measures. Knowledge is power, and understanding the risks can help you make more informed decisions about your online behavior.

10. Seek Professional Help

If you or someone you know becomes a victim of sextortion, seek professional help. There are organizations and services that offer support and guidance on how to navigate the aftermath of sextortion. Sextortion can have profound emotional and psychological effects on its victims. Seeking professional help is a crucial step in the recovery process, providing victims with the support and guidance needed to navigate the aftermath of such an ordeal.

Access Support Organizations

Call our Hotline: 1-833-4NEWDAY. We have case managers who can help you get any images down and assist you with managing through the process.

Cybercrime Support Networks: Many countries have organizations dedicated to supporting victims of cybercrimes, including sextortion. These organizations can offer legal advice, psychological support, and guidance on how to report the crime.

Mental Health Professionals: The trauma resulting from sextortion can be significant. Psychologists or therapists specializing in cybercrime victimization can provide coping strategies and emotional support to help victims recover.

Legal Assistance

Consult Legal Experts: In some cases, legal action may be appropriate or necessary. Consulting with legal professionals who have experience in cyber law can help victims understand their rights and the potential for legal recourse.

Educational Resources

Learn From the Experience: Educational resources provided by support organizations can help victims and their families understand the dynamics of sextortion and how to protect themselves in the future.

Peer Support

Support Groups: Joining support groups, either online or in-person, can provide victims with a sense of community and understanding. Sharing experiences with others who have faced similar situations can be incredibly healing.

Using technology wisely and seeking professional help are pivotal strategies in protecting against and responding to sextortion. By embracing secure technology practices, individuals can significantly reduce their risk of falling victim to online threats. And when sextortion does occur, professional support is indispensable in helping victims recover and regain control over their lives. These proactive and reactive measures together form a comprehensive approach to dealing with the complex challenge of sextortion.


Nikki Stenson 🇿🇼

Marketing leader owned by 3 Jack Russell's (yes, really) | ex Oracle, McAfee | Strategic Marketing Advisor | Autism & Mental Health advocate & speaker | Chief Alumni | Mentor | Wild Swimmer |

10mo

Extremely important conversation to have with your children and loved ones about remaining safe online!

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics