Are you being Cyberstalked?
Article #2

Are you being Cyberstalked?

What is considered cyberstalking?

Here are some examples of things people who cyberstalk might do:

  • Post rude, offensive, or suggestive comments online.
  • Follow the target online by joining the same groups and forums
  • Send threatening, controlling, or lewd messages or emails to the target
  • Use technology to threaten or blackmail the target
  • Tag the target in posts excessively, even if they have nothing to do with them
  • Comment on or like everything the target posts online
  • Create fake accounts to follow the target on social media
  • Message the target repeatedly
  • Hack into or hijack the target's online accounts
  • Attempt to extort sex or explicit photos
  • Send unwanted gifts or items to the target
  • Release confidential information online
  • Post or distribute real or fake photos of the target
  • Bombard the target with sexually explicit photos of themselves
  • Create fake posts designed to shame the victim
  • Track the target's online movements by installing tracking devices
  • Hack into the target's camera on their laptop or smartphone

Cybercrimes mainly happen to educated


How to Prevent Cyberstalking

Make Security a Priority

The first step in preventing cyberstalking is to ensure that your devices and your online accounts are as secure as possible. Here are some steps you should consider taking.

  • Create strong passwords. Make sure you have strong passwords for all your online accounts as well as strong passwords for your devices. Then, set a reminder on your phone to regularly change your passwords. Choose passwords that would be difficult to guess but are easy for you to remember.
  • Be sure to log out every time. It may seem like a pain, but make sure you log out of email, social media accounts, and other online accounts after using them. This way, if someone were able to get into your device, they would not have easy access to your accounts.
  • Keep track of your devices. Don't leave your phone sitting on your desk at work or walk away from an open laptop. It only takes a minute or two for someone to install a tracking device or hack your device. So, make sure you keep these things in your possession or that you secure them in some way.
  • Use caution on public Wi-Fi. Recognize the fact that if you use public Wi-Fi at hotels or at the local coffee shop, you are putting yourself at risk for hacking. Try to refrain from using public Wi-Fi or invest in VPN.
  • Practice online safety habits. In other words, make it a priority to only accept friend requests from people you know and keep your posts private. You also should consider having one email address that is specifically for your online activity. Use this email when you do your online shopping or join loyalty programs.


Practice Digital Hygiene

  • Create generic screen names. Rather than using your full name online, consider developing a gender-neutral screen name or pseudonym. By doing so, you are making it harder for people to find you online. You also should leave the optional sections, like your date of birth or your hometown, blank.
  • Keep locations secure. Consider disabling the geolocation settings in photos. You also should refrain from posting your location in real time and instead post photos showing where you have been after the fact.
  • Be careful with online dating sites. Refrain from using your full name on online dating sites. You also should avoid giving out personal information like your last name, address, email, and telephone number until you have met in person and established a level of trust.
  • Social Media Audits: It's always a good idea to go through your social media accounts and remove photos or posts that provide too much information about you or that create an image you don't want out there. Keep in mind, too, that even if you have blocked someone on social media, they may be able to still see your account by using another person's account or by creating a fake profile.

Cybercrime is an offence


Take Action

If you have asked the person cyberstalking you to stop and their behavior continues, it's important to take action against them. This includes contacting the appropriate authorities and collecting evidence of their actions. You also may want to consider talking with an attorney.

Here are the key points that will need addressed when taking action. Your local law enforcement can let you know if there is anything else you can do in order to stay safe.

  • Save evidence of everything. Even though you may feel like destroying everything, it's important to keep copies of everything the person cyberstalking you has sent. Make a copy for yourself and a copy for law enforcement.
  • Notify your local police. It's important to notify the police and file an official complaint if you're being cyberstalked. Even if they cannot do anything right away, having an official complaint on file is important if the behavior persists or escalates.
  • Report them to the site or service they used. If the person cyberstalking you harassed you through Facebook, Instagram, Twitter, Snapchat, YouTube, Gmail, or some other method, let the appropriate authorities know what you're experiencing. Many times, these organizations take complaints of cyberstalking seriously and will address the matter.


Stay tuned for more such insightful information and tips to protect yourself from cybercrime.

Jared Pins

Multi-Faceted Social Media Marketing & Digital Marketing Expert LinkedIn Top Social Media Marketing Voice | Top 2% Of Marketers

6mo

Thought-provoking post on cyberstalking risks and prevention tips. Gargi Gaur

Like
Reply
Gargi Gaur

Emerging Cybersecurity and AI Enthusiast with Google and Microsoft Certifications | 3rd Year Engineering Student | Content Writer| Graphic Designer

6mo
Like
Reply

To view or add a comment, sign in

More articles by Gargi Gaur

  • Digital Arrest Explained

    Digital Arrest Explained

    What is a digital arrest scam? A digital arrest scam is an online scam that defrauds victims of their hard-earned…

  • Open guide to Incident Response Plan

    Open guide to Incident Response Plan

    Incident response (IR) in cybersecurity refers to the process of addressing and managing a security breach or…

    2 Comments
  • Password Management and Protection

    Password Management and Protection

    Password management refers to the process of securely creating, storing, and handling passwords for various digital…

    4 Comments
  • Risk Management Guide for Beginners

    Risk Management Guide for Beginners

    Cybersecurity has become a crucial concern for individuals and organizations alike as we move towards a more digital…

    3 Comments
  • Maintaining Digital hygiene Part2

    Maintaining Digital hygiene Part2

    Recommendations for safe browsing Take note of these tips to avoid falling into the trap of cybercriminals: · Do not…

    4 Comments
  • How to maintain Digital hygiene?

    How to maintain Digital hygiene?

    Digital hygiene comprises a series of resources and recommendations to protect people’s digital identity and the…

    1 Comment
  • All about Penetration testing

    All about Penetration testing

    What is penetration testing? A penetration test, or "pen test," is a security test that launches a mock cyberattack to…

    2 Comments
  • What is Ethical Hacking?

    What is Ethical Hacking?

    Ethical hacking is the use of hacking techniques by friendly parties in an attempt to uncover, understand and fix…

    2 Comments
  • Are all hackers cyber criminals?

    Are all hackers cyber criminals?

    Hacker is an individual who uses his or her skills to achieve unauthorized access to systems or networks to commit…

    2 Comments
  • Watch out for these most common attacks!

    Watch out for these most common attacks!

    1. Malware Malware — or malicious software — is any program or code that is created with the intent to do harm to a…

Insights from the community

Others also viewed

Explore topics