Cyber Stalking: Protecting Yourself Against Cyber Harassment

There’s been a lot of discussion lately about cyber-bullying, but cyber stalking can be just as serious and even dangerous. What is cyber stalking? Cyber stalking is a form of harassment where a stalker engages in persistent, unwanted, and obsessive behavior. It takes place through online media such as instant messaging, email, and mobile technology.

Facts about Cyber Stalking

Cyber stalking often seems innocent or harmless in the early stages, because it is usually perpetrated by someone you know. Behavior such as “checking up” on you, or getting in contact continuously can often be misunderstood at first as a way of expressing ordinary concern.

However, the behavior soon escalates and becomes harassing, demeaning, or terrorizing. Stalking behavior often becomes increasingly erratic and extreme as the victim rejects it and seeks protection. At first, these activities might only be a violation of a company’s Terms of Service at first. However, they can quickly escalate into criminal behavior.

Cyber stalking is usually perpetrated by someone you know:

– An estranged boyfriend or girlfriend.

– Someone from your social circle.

– A former or current co-worker or boss.

The Dangers of Cyber Stalking

You can recognize this form of stalking because it makes you feel threatened and it takes place online. Stalkers can keep tabs on their intended victim and attack them through vicious behavior on social media or instant messages. The stalker always intends to control their victims.

In extreme cases, cyber stalking can lead to serious consequences in real life. Incidents such as violent confrontations, identity theft, and much more can result from stalking. Because of this, it’s important to take action quickly when you feel that someone’s behavior has crossed the line. It’s very important especially if they are engaging in a pattern of antagonism that affects your work or family.

Staying Safe From Cyber Stalkers: How to Report Cyber Stalking

The source of cyber stalking behavior is as complex as face-to-face stalking. But, the important thing to remember is that the victim is never at fault. It’s important to know how to report cyber stalking and what to do to protect yourself.

Online stalking is always a violation of the Terms of Service of Internet service providers, software providers, and others. Their hard work and resources are used to facilitate these criminal acts. You can contact the stalker’s internet service provider to report stalking behavior. You can also make a report with the police in your area.

It’s usually hard to prevent someone from accessing a social media network or instant messaging platform by reporting them. It is so easy to create a new online identity that such reports are always usually helpful. Lodge your complaint directly with the person’s Internet or mobile phone provider and follow up with the authorities.

Internet service providers have a lot of information on what goes on in their networks. Nevertheless, your evidence will always be helpful. Learn how to save chat logs and emails. The “print screen” button on most standard Windows keyboards allows you to screenshot what’s on your monitor at any time. Then, you can “paste” into a paint program and save.

Protecting yourself from Cyber Stalking – Some Facts to Consider

Online stalking can involve “hacking” or damaging your property in order to keep your activities under surveillance. Thus, it’s important to understand that avoiding stalker online by changing software accounts or passwords may not be enough. You should also take steps to keep your computer physically secure.

– Ensure that no one has access to your computer or mobile device outside of your presence.

– Log completely out of all software applications and websites whenever you leave the computer.

– Make sure all Internet-enabled devices use a password-protected screen saver to reduce access.

– Search social networks to find and remove private information about yourself where possible.

– Delete online calendars and be careful using mobile “check in” apps that show your location.

– If you believe a compromise happened in your device, get help by using public terminals and phones.

Now that you understand more about cyber stalking you can take steps to guard yourself. Anyone with an online presence has a chance of encountering stalking behavior. One pillar of your defense is using a program like Norton 360. Thus, you can defend against compromised websites, files, and other nefarious ways. So a determined stalker will not be able to pry into your life.

To learn more, visit the National Institute of Justice or Wired Safety.

Leave a Reply

Your email address will not be published. Required fields are marked *