Internet Safety Tips For Victims of Cyber Bullying


Home Security Systems Companies MumbaiIts 2013! And the world hasn’t ended unlike what the Mayan Calendar would have us believe! It is as good a reason as any to get off your seat now, stretch, look out of your window and feel glad to be alive! Come back and read the rest of the article after your break though! Atin who handles marketing and communications for Alliance One instead of trying to shed old habits like the rest of the world instead tries to gain a new habit and skill every year. Last year it was learning to play lead guitar and he can now play a mean blues solo! This year he has taken it upon himself to learn music production so that he can bring to life some of the beautiful songs that he has composed over the years! So he has gone and got himself a midi keyboard, purchased digital audio software  studio monitors and sounds cards, ramped up his computer’s speed and power (whoever said pursuing one’s passions is cheap!) and yes also found himself a teacher who will come home and teach him all that he needs to know to create a hit song from the comfort of his bedroom! And yes, he has promised to let our blog’s readers download them once he has acquired the skills to create songs on his computer.

Similarly talking of new skills and knowledge one of your new year resolutions should be increase your knowledge of security and safety so that in the future you are well equipped with the skills and knowledge to protect yourself and your loved family members and also coach them on how to protect themselves in our increasingly hostile planet. Think about it – The world is becoming more dangerous with every passing year and not safer! Upgrading your knowledge of internet security should be priority no. 1. When you think of Internet security, you are probably thinking of protecting your personal and financial information. However, there are other types of internet security breeches. One type is cyber bullying.

How to Prevent Cyber Bullying

Best Detectives in MumbaiA phrase that is becoming more and more prevalent in the world wide web, cyber bullying can be very invasive and emotionally upsetting to children, teens, and even adults. It’s difficult to control because in many cases the perpetrator is known but can not be proven. How? Because they will give just enough information to let their victim know who they are, but not enough information to actually be convicted of anything. They can do this by using pretend user names, fake pictures, and revealing very little information about themselves. So what types of things happen with cyber bullying?

1. Threats – a lot of times, a cyber bully will make threats. These can be thinly veiled or outright vicious. Harassment on victim’s own website – another type of cyber bullying occurs when the bully posts negative material in abundance on the victim’s own website. This can come in the form of negative comments, threats, and other types of general harassment.

2. Slander- if the bully has their own site (like a blog or a facebook page) they might make slanderous comments about the victim. These can be falsities, such as claiming that the victim is cheating on their spouse/significant other, or they can be harmful truths that the general population doesn’t need to know.

3. Accusations – a rare form of cyber bullying, but equally dangerous, is when the bully actually accuses the victim of doing the same thing that the bully is doing. An example would be this: the bully sends negative e-mails to the victim. Then, the bully gets on their own blog or website and writes about ow upset they are due tot he fact that the victim is sending THEM negative emails. In such cases, the bully might even receive sympathy and the victim is then harassed even more by people who feel sorry for the victim.

So why do things like this happen?

It is very difficult to know why. Anger, resentment, lack of self-esteem, or sometimes plain boredom can lead to cyber bullying. In addition, the anonymity of the internet makes it easier than every to bully someone. Still, cyber bullying can be emotionally devastating and can threaten your own emotional security. If it is happening to you, don’t sit back and let it continue. Inform those around you and seek the help of an expert to trace down the individual and then hand them the evidence to the police. We have traced many cyber bullies in the past and you can contact us here if you are a victim.

5 Tips to Ensure Internet Security

Do you want to keep your computer and personal information safe? Of course you do. Here are 5 tips to help ensure your internet security.

1. Be careful of e-mail attachments

One of the most common ways to threaten your internet security is to open an e-mail attachment that contains a virus. Sometimes, just clicking on the attachment itself will unleash the virus. If you receive an email from someone that you don’t know and it contains an attachment, don’t open it just to be on the safe side. You can always send a message to that person to verify that the email is legitimate. It’s best to invest in an anti virus software program that can scan the attachment before you open it. Some e-mail systems will scan emails for you. However, if you go through a free program (like hotmail) don’t count on the system being complete.

2. Anti-virus software

You must invest in anti-virus software. It is one of the most important things for your computer. In addition to keeping you safe from viruses, it can also scan your hard drive and clear out unnecessary information, thus making your computer run more efficiently as well. Anti-virus software programs are everywhere but it helps to do some research before investing in one. With some of them, you have to update them and pay again every year.

3. Update security patches for your browser

On Windows, you can go to “Windows Update” under the “Start” menu it will update security patches for you. Also do not postpone the ‘new updates’ messages that pop up. Update your system immediately when an ‘update’ message pops up from Windows or your anti-virus software. This is necessary because holes are formed on the Internet frequently and while you might be protected this week, that doesn’t guarantee that you will be next week.

4. Protect your passwords

While it is easier to use your same password, or a variation of it, for all of your accounts, it is safer not to do so. When forming your password, it is better to use a combination of letters and numbers. Also, never give your password out to anyone and resist the urge to store them on your computer. From time to time, change your password on your important accounts that contain personal information or financial information for added internet security. I use an encrypted password keeper like keepass to create and store all my passwords. I suggest you do the same if you do not already use one.

5. Install a firewall.

A firewall blocks unwanted access to your computer. Some systems, like Windows, have firewalls built into them. You can also download others.

Internet Security – Downloading Music off the Internet

Internet Security Tips Tactics 2013Today, most people have downloaded music off of the Internet. Not only is it convenient, but it is also fun and very inexpensive. In the past, if you liked a song you either had to wait until it came on the radio to record it or you had to go out and buy the entire album. Not only was this expensive, but it could be a hassle, too, if it was the only song off of the album that you wanted. Downloading music, however, costs less than RS. 50 per song in most cases. It also downloads quickly and you can burn it on a CD for your home or vehicle. However, downloading music off the internet comes with internet security risks as well.

When a peer to peer (P2P) site is used like Bit Torrent, each person’s computer acts as a host for a song or download. After installing software, a person can decide if they want to only download from other people or let other people also get into their computer and download from them. Obviously things like this can cause problems where internet security is concerned. By letting other people into your computer to download music, other things on your computer are also at risk from being taken as well. This is especially true if a good hacker gets in control of your computer. Files might be stolen, or deleted, or a virus can get into your computer and infect it, causing you to lose everything. Not really worth it for a free songs.

There is another problem with downloading music in this way as well. Music is copyrighted. When you download it without the artist’s consent, you are basically stealing. It is punishable by law. A common argument is that artists are already rich and downloading a couple of songs shouldn’t matter. However, it does matter. Artists, by the way, don’t really make that much money off of their CDs. For a sold CD, some of the profit goes to the songwriter, some to the record company, some to the musicians that played on the album, some to the distribution, and some to the record store that sold it. Unless the artist was also the songwriter, they are getting a very low profit, usually only about thirty to forty rupees or so per CD.

If you are downloading music, have a good anti-virus software program available, as well as a strong firewall.

Author Bio

Amit Sen, a commercial pilot by training, has over 15 years experience in the space of corporate investigations, handling Copyright & Trademark infringement cases, Pre – employment verification Industrial Espionage investigations, Asset & Net – Worth assessment assignments and vendor / supplier verification cases, among others. Co-founder of Alliance One Detectives – which is the best home security consultants in Mumbai. Apart from specializing in home security, Amit has also successfully completed assignments in a wide range of sectors, including the machine tools industry, pharmaceutical industry, hospitality sector, specialized equipment (Oil & natural gas sector, aviation industry etc.), telecom industry & the IT & ITes sectors. These cases have all involved both offline and online investigations.

Article edited and co-written by Atin Dasgupta who is the co-founder and marketing head of Alliance One. Read more about Atin here.

[tell-a-friend id=”1″ title=”Tell a friend”]