Advertisements
Cyberbullying

Relationship Between Cyber Security and Cyberbullying

This post was originally published on this site

https://incyberdefense.com/editors-picks/cyber-security-and-cyberbullying-there-is-a-connection/}

Cyber Security and Cyberbullying: There Is a Connection

By Marissa Bergen 
Contributor, InCyberDefense

October is both National Bullying Prevention Month and National Cyber Security Awareness Month. While many people might not make a connection between these two events, the relationship becomes apparent if you follow certain thought processes.

Hackers Can Penetrate Your E-Mail or Social Media Accounts and Use Them to Bully You

Cybercrimes are usually done with the intent to steal money. But sometimes, cybercrimes are acts of mischief that could have a big impact on you.

For example, cowardly hackers might use your information to impersonate you online and harass people you know. That has a negative impact on your friends, family members and coworkers.

Hackers May Steal Your Personal Content

Another way hackers can bully you online is by gaining access to your sensitive content. Sexually explicit pictures are a good example.

Cyberbullies try to get their hands on this content and distribute it with the intent of damaging your reputation. Some hackers might even steal such photos or other sensitive data and demand payment in return for not publicly posting that data.

Sharing Passwords Also Makes You More Vulnerable to Hacking

The more people who know your passwords, the more vulnerable you are to cybercrimes. Often, friends will pressure you into sharing your password. This practice can also be a form of cyberbullying when it is done excessively. Don’t feel you have to give out your password just because your friends insist on knowing it.

Ways to Protect Yourself against Cyberbullying and Crime

Although cybercrime is prevalent on the Internet, there are ways you can minimize the chances of you becoming a victim. Here are some examples:

  • Protect your phone with a strong password: A strong password, fingerprint or Personal Identification Number (PIN) are all excellent ways to protect your phone from cybercriminals.
  • Have the ability to erase your phone remotely: Apple’s iCloud and Google’s Android Device Manager make it easy to erase data on your iPhone or Android phone if it is lost or stolen. Just be sure that your phone is set up to be accessed remotely if you want to take advantage of this security feature.
  • Be careful of what you post publicly: Although freedom of speech is still very much alive and well, it is important to think about what you are posting and how others will perceive it. If you post something that could upset other people, they might be likely to target you in return.

If they are skilled at hacking, they could create unpleasantness for you. You don’t have to completely avoid sharing your feelings on your social media accounts but use your privacy settings. That way, the post most likely will not be seen by anyone who might be upset by your words.

Cybersecurity and cyberbullying can go hand in hand. Take steps to protect your online identity so that you minimize the likelihood of these occurrences. October is the month to be most aware of your online security, so be sure to take the necessary steps to keep yourself safe.

Your Donations Help Support Our Work

Like and Share on our Facebook page

#bullying #cyberbullying #cybercrime #cyberthreats  #internet #predators #safety #security #selfharm # seniors #sharing #socialmedia #suicide

Advertisements
Dr Don
Dr. Don Yates Sr Ph.D. Online since 2004 investigating and reporting Internet Crimes, Scams, Threats as well as Business and Work from Home Opportunities Author. The Internet Users Handbook 2nd Edition 2009-2013, Mentor, Advisor and Coach, Entrepreneur, Retired Chairman, CEO, and President, RE Broker
Dr Don
Dr Don

Latest posts by Dr Don (see all)

Previous Post
picks
Blog Business Children Family Cyber Crime Security Scams Fraud

Social Caring & Sharing

Next Post
Self-Harm
Blog Children Family Cyber Crime Security

Teen Self-Harm

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.