The alarming rise of online abuse: How to protect yourself against cyber victimization

The alarming rise of online abuse: How to protect yourself against cyber victimization

 

The alarming rise of online abuse: How to protect yourself against cyber victimization

Abuse revolves around power and control. In today's digital age, increased online activity offers abusers more opportunities for harassment and abuse. Technology-assisted abuse involves harm to victims, power imbalance, repeated unwanted contact, use of electronic devices, and anonymity of abusers.

Online harassment and abuse are never acceptable but are increasingly common. They can lead to mental, physical, and financial abuse and cause significant psychological distress and health issues.

While rapid technological advancements challenge protective measures, individuals can take proactive steps to safeguard themselves. Here are some strategies for dealing with online abuse:

1. Protect Your Privacy & Security

Secure your devices. Evaluate whether “smart” devices need to be connected or synced. Internet, Bluetooth, and other devices can enable remote monitoring, posing potential risks for tracking and hacking. Consider if the risk outweighs the reward.

Use strong passwords and activate two-factor authentication (2FA) on all accounts to prevent unauthorized access.

Limit personal information shared on social media platforms (avoid sharing your school, workplace, phone numbers, addresses, or locations—especially in real-time). Review photos and posts for identifying information such as places you frequent, your children’s school, family members, or any other relevant information.

Review privacy settings on social media platforms to control who can view your posts. It is advisable to consider setting your profile to private to manage who can see your posts or interact with you. While it may feel restrictive due to an abuser, prioritizing your safety is paramount.

Utilize a VPN to mask your IP address and prevent doxxing.

Assess your online presence: Regularly search for information about yourself and adjust as needed.

2. Social Media Safety

Exercise caution when posting your location in real-time. Disable location tagging and avoid geotagging posts in real-time.

Use an alias or separate accounts for personal and professional interactions.

Monitor Google for publicly available information and request the removal of personal data from search results.

3. Blocking & Reporting Tools

Do not engage with trolls—many abusers and harassers seek reactions; therefore, refrain from engaging. Block or mute harassers to prevent further contact.

Utilize platform reporting tools (Instagram, Facebook, Twitter, etc.) to report harassment or abusive accounts.

4. Document Everything & Report Serious Threats

Save emails, texts, and screenshots. In case of escalation, having comprehensive evidence will facilitate the process for yourself and the appropriate authorities.

Take screenshots of any harassment, threats, coercion, or abusive messages as evidence. If social media or messaging platforms have options to delete or change texts, capture the evidence as it occurs.

Report threats to authorities if they involve violence, abuse (sexual, emotional, financial, psychological, etc.), stalking, or blackmail. Even if you do not wish to press charges, you can still report it. Establishing evidence and documentation is crucial for recognizing patterns of abuse and enhancing safety.

Consider legal action if necessary (e.g., restraining orders, criminal convictions, or civil cases). Depending on your location, there may be specific support available to address online and digital harassment.

Understand digital harassment laws. Familiarize yourself with your rights and legal protections in your jurisdiction. For instance, the Intimate Images Protection Act in British Columbia (BC) addresses the non-consensual distribution of intimate images. It is a Criminal Code offence to share someone else's intimate images without their consent. Victims can report this to the police or seek civil remedies. The legislation covers various types of images, and individuals can apply for protection orders through the Civil Resolution Tribunal. The tribunal can require image removal, award damages, and impose penalties for non-compliance.

5. Mental & Emotional Protection

Limit exposure by taking breaks from social media when needed. Remember there is life offline. Engage in nature, connect with friends, and participate in community activities outside the digital realm.

Avoid isolation: relationships offer healing. Maintain connections with friends, family, or explore new activities to meet people.

Seek counselling or therapy if available. Speaking to a trusted and safe individual can help navigate the mental and emotional impact of online abuse. A trained therapist can provide tools and strategies for coping and offer a secure environment for emotional healing.

Book recommendations:

How to Be A Woman Online: Surviving Abuse and Harassment, and How to Fight Back 

All women in politics, journalism and academia now face untold levels of harassment and abuse in online spaces. Together with the world's leading extremism researchers, Jankowicz wrote one of the definitive reports on this troubling phenomenon. Drawing on rigorous research and her own experiences, Nina provides a step-by-step plan for dealing with harassment, abuse, doxing and disinformation in online spaces.

Buy on amazon: https://amzn.to/3QTtpf5

The Gift of Fear: Survival Signals That Protect Us from Violence

A carjacker lurking in a shopping mall parking lot. An abusive husband pounding on the door. A disgruntled employee brandishing a gun. These days, no one is safe from the specter of violence. But according to Gavin de Becker, everyone can feel safer, act safer, be safer — if they learn how to listen to their own sixth sense about danger.

Buy on Amazon: https://amzn.to/43wMwD9

Visit my Amazon Store for full list of book recommendations for addressing and surviving online abuse: https://amzn.to/3XFtNl9

Sources:

Online harms faced by youth and young adults: The prevalence and nature of cybervictimization

Technology-Facilitated Abuse

Back to blog

Leave a comment