1. Never reveal your home address. You don’t who will visit you.
2. Password protect all your online accounts including cell phones, land lines, e-mails, banking and credit cards. Do not use a simple password that can be guessed by someone. A survey found in that most people use their birthdays, pet name or spouse name in passwords.
Use at least 8 characters including a capital letter, a number and a symbol for minimal password. Change your password every now and then and never share it with anyone. 3. Your secret questions should not be easily answered.
4. Conduct an internet search using your name and phone number. Make sure that there is nothing on internet about you, that you are not aware of. A cyberstalker may have created a facebook account in your name or a blog about you.
5. Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information. The "Caller ID Spoof" can mimic your bank's caller ID. It is very easy for a cyberstalker posing as a banking representative, credit card representative or your cell phone provider to obtain your personal private information. If you are suspicious hang up and call the institution directly in order to make sure sure that you are not a target of a cyberstalker.
6. Never give out your ID Number unless you are absolutely sure of who is asking for it and why. With an ID cyberstalker can have access to every part of your life.
2. Password protect all your online accounts including cell phones, land lines, e-mails, banking and credit cards. Do not use a simple password that can be guessed by someone. A survey found in that most people use their birthdays, pet name or spouse name in passwords.
Use at least 8 characters including a capital letter, a number and a symbol for minimal password. Change your password every now and then and never share it with anyone. 3. Your secret questions should not be easily answered.
4. Conduct an internet search using your name and phone number. Make sure that there is nothing on internet about you, that you are not aware of. A cyberstalker may have created a facebook account in your name or a blog about you.
5. Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information. The "Caller ID Spoof" can mimic your bank's caller ID. It is very easy for a cyberstalker posing as a banking representative, credit card representative or your cell phone provider to obtain your personal private information. If you are suspicious hang up and call the institution directly in order to make sure sure that you are not a target of a cyberstalker.
6. Never give out your ID Number unless you are absolutely sure of who is asking for it and why. With an ID cyberstalker can have access to every part of your life.
7. If you are using credit cards to pay online . Check your credit report regularly
8. if you are leaving a partner, spouse or boyfriend or girlfriend – reset every single password on all of your accounts to something that they cannot guess. If you encounter something suspicious – a weird phone call or an emptied account that can't be explained by your bank – it could be a cyberstalker so act accordingly. Change all your accounts, and ideally change banks.
8. if you are leaving a partner, spouse or boyfriend or girlfriend – reset every single password on all of your accounts to something that they cannot guess. If you encounter something suspicious – a weird phone call or an emptied account that can't be explained by your bank – it could be a cyberstalker so act accordingly. Change all your accounts, and ideally change banks.
9. If you think you're a target, have your PC checked by a professional. If you are already experiencing cyberstalking incidents, your computer may already be compromised. Have someone who is aware of the subject to check for spyware and other viruses, keyloggers installed.
10. If you think you have a cyberstalker problem. Move fast. Record incidents – time, place, event. Cyberstalkers often rush off the first "attack" that it encourages them to keep going. The faster you take action and block their ability to hurt or harass you, the sooner they lose interest in their project.
11. Get lots of emotional support to handle the cyberstalking period and to deal with the aftermath. It is normal to feel high levels of distrust and paranoia after a cyberstalking encounter. You may feel isolated and alone. The best thing is to get help from brave people who will help you to put your life back together.
12. True cyber stalking situations are malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment and threats. What ever the situation never underestimate the threat as it can grow rapidly.
No comments:
Post a Comment