How do you protect yourself from cyber stalkers?steemCreated with Sketch.

in hive-138458 •  3 years ago 

First of all, does anyone know who is called a #cyber #stalker?

photo-1483817101829-339b08e8d83f.jpeg

📌Cyber stalker is defined as the use of online technologies to harass and threaten a chosen victim. It can happen to anyone, no matter age and gender.
The evolution of technology and the rise in social media apps have made it easier for followers to track and harass their targets. The anonymity of the digital world has unfortunately begun to allow online followers to gather information and manipulate their victims without physically interacting with their targets.
📢How to Detect Cyber Stalkers
According to a survey conducted in January 2020, 44% of internet users report experiencing at least some form of harassment online. Specifically, 28% experienced a more serious form of online harassment, including physical threats and stalking. Additionally, 77% of victims reported being harassed or followed on Facebook.
Cyber attackers use various tactics to intimidate, humiliate and control victims such as;

📌Imitating the victim on social media.
📌Hijacking devices and online accounts.
📌Bombarding the target with messages, even after the perpetrator is asked to prevent .
📌Stalking can occur via email, instant messaging apps, texts, spyware installed on a device, or even GPS devices installed in the victim's vehicle.
📌Criminals search for their victims on search engines, chat rooms, blogs, dating apps, and social media sites like Facebook, Instagram, Twitter, and LinkedIn. These platforms allow abusers to collect personal information and pinpoint their real-world location for use against the victim.
📢How Can We Protect Against Cyber Stalkers?
To find out what information a follower can find about you online, try doing a Google search yourself. You might be surprised how easy it is to find your personal information on the web, such as a phone number, work or home address. If various information is added from the social media profiles of your family or friends, the target's knowledge limits will become larger.
In addition to recognizing cyberstalking behavior, individuals should take proactive measures to protect their digital and physical health and limit their unnecessary online activities, including:
📌Review and regularly change passwords for all online accounts.

📌Disable public travel plans or calendars.
📌Limit online sharing with people other than your close friends or family.
📌Review friend lists and remove or block unknown contacts.
📌Avoid reporting locations when posting photos online, as this could allow Stalker to track where you are.
📌Use a security solution and VPN to protect yourself against malware attacks and eavesdropping on your network.
📌Avoid using the check-in option on Facebook.
📌Do not give out sensitive or personally identifiable information such as your full name, phone number, home address or workplace to people you meet on dating apps, social media or gaming platforms.
📌Block people who abuse you and report them to the social media platform.
Apps like Bitdefender's Digital Identity Protection tool allow you to monitor the digital footprint you leave behind as you surf the web. Public information such as your name, age, email address, phone numbers and jobs, education, and pictures are grouped into categories that allow you to easily analyze sources of information. Users can choose to access data and remove accordingly.
While not all cyber stalking involves serious online harassment, victims can face a wide variety of physical and emotional consequences that disrupt their lives and mental states.
Somehow, most cyberstalkers are familiar with their victims. In some cases, the stalker may be an ex-boyfriend or even a coworker.
If you, a friend or family member encounter persistent digital harassment, feel threatened or scared, report it to the prosecutor's office immediately. It's always helpful to keep a folder of screenshots, #malicious emails or texts as evidence to hand over to law enforcement.

Image Source👇👇👇https://unsplash.com/s/photos/cybersecurity
Enjoy Reading ☺️

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  


image.png

Your post has been upvoted by @zero-to-infinity. We are supporting all the STEM Content Publish in Steemit.

For more,you can visit this community

JOIN WITH US ON DISCORD SERVER:

Support us by delegating STEEM POWER.
20 SP50 SP100 SP250 SP500 SP

Follow @zero-to-infinity & @steemitblog for last updates