Your Essential Guide to Cyber Security

The emergence of social media networks has made it easier for us to be connected with others. Unfortunately it brings with it many security and privacy related issues.

Social networks are increasingly being used as a tool for identity theft, stalking, harassment, invasion of privacy, and other forms of violence.

world-shaker-cyberbullying-infographic-421097Cyber Bullying

The definition of cyber bullying is bullying which takes place using electronic technology. It encompasses equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Online violence, including bullying and harassment, can be severely traumatizing and humiliating for the victims and their families, with sometimes serious consequences. Therefore it is important for everyone to be aware of preventive as well as remedial measures for protection online

Protecting Yourself Online

This section aims to provide tips on maintaining digital security and privacy, as these are considered essential in helping with online safety. Following these practices can help prevent violations of privacy, blackmail, harassment and bullying etc.

Password Security

  • 20110805passwordsecurityLock your screens when away and restrict information shown by notifications. Don’t leave your phone unattended!
  • Don’t use simple passwords like dates of birth, names of your loved ones, words in a dictionary etc., as these are easily hacked by those intent on theft, stalking etc.
  • Don’t use the same passwords everywhere. Use a good browser extension like LastPass to manage your passwords if you have trouble remembering them.

Social Media Security

  • Do not share your private plans on social networks as it makes it easy for stalkers to track you down.
  • Cyber stalkers usually tend to be people you know or have interacted with. A useful practice against hacking is to use a separate email account for social media accounts and to keep it confidential. This should make hacking into your other accounts harder.

General Internet Security Advice

  • why-need-img-1Use two-step verification and secure all your accounts. The two-step verification system is available for Google, Twitter, Facebook and Outlook email accounts.
  • Sometimes it helps to search for your name on the Internet to find out if there is any information on you on the Internet. If you find your pictures or personal information on websites you have not authorized, you can request the webmaster or the service provider to remove them.
  • Inform your family if you are facing any problems. It is important to keep them in the loop lest there are any issues later.
  • One way to avoid cyber-stalkers is to use applications such as True Caller (available for Android and iOS). Such applications crowd source user information from the phones of other users and can help identify unknown numbers.
  • Do not feed the troll/bully. Ignoring and blocking are frequently successful, especially at the early stages of harassment.

Underage Users

Extra care must be exercised for the protection of underage users of social media. They can easily endanger themselves and their families, and must be supervised in their use of social media. Minors are often targeted by pedophiles.

  • Remain aware that Facebook has a minimum age limit of 13 for its users. Parental guidance and supervision is key in keeping children safe in their use of social media.
  • Supervise online activity of minors as predators/pedophiles use the Internet and social media to target them.
  • Educate children under your care on the risks or dangers inherent to the use of the Internet. Make sure they do not provide any personal information such as real names, addresses, their school name or phone numbers to strangers.

Deleting your digital footprint

iStock_000037217352Large-300x239At the very least, you should be actively maintaining a list where you note down all services you registered on. Review it occasionally and start deleting your presence on the ones you don’t use.

One way to delete traces of your Internet presence is to go to JustDeleteMe. This is a directory of direct links to various websites so that you can delete your accounts.

The links are color-coded to indicate the difficulty level of account deletion. They are categorized as easy, medium, hard and impossible. Some of the links give information on how one can delete an account while there is no information for some websites.