{"id":16932,"date":"2018-03-05T20:00:25","date_gmt":"2018-03-06T01:00:25","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16932"},"modified":"2022-04-28T08:57:43","modified_gmt":"2022-04-28T12:57:43","slug":"celebrate-cybersecuritys-womens-day","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/celebrate-cybersecuritys-womens-day\/","title":{"rendered":"Celebrate Your Own Cybersecurity Women&#8217;s Day!"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Several universities around the world have created <\/span><a href=\"http:\/\/www.bcs.org\/content\/conEvent\/10414\"><span style=\"font-weight: 400;\">Cyber Security Women\u2019s Day<\/span><\/a><span style=\"font-weight: 400;\"> to teach women about tech. On International Women\u2019s Day (March 8th), we encourage you to expand this concept and take your online safety into your own hands, just as women in marches take to the streets and occupy physical spaces without fear. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Women can be targets of cybercriminals, cyberstalking, cyberbullying and much more. We\u2019ve covered some basic digital crimes you should know about and what proactive ways to take charge of your online life.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/new-empowering-female-emojis-coming-android\/\"><b>New Empowering Female Emojis Coming to Your Android<\/b><\/a><\/p>\n<p><b>How Does Cyberstalking Affect Women?<br \/>\n<\/b><span style=\"font-weight: 400;\">Internet users have been targeting women in defamatory and humiliating ways since the inception of the web, and social media has only made things worse in recent years. There are many cyberstalkers out there who constantly monitor what a woman is doing, while also contacting them frequently in the hopes of initiating a relationship or in vain hope of trying to keep a dead one going. Sometimes these situations turn into full-blown harassment, with lewd, offensive, or threatening comments being leveled at women. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are also online predators who seek out ways to exploit women, including those who share vulnerable images or videos of women online with the intent of causing them harm. Such a crime is punishable by law, but even bringing justice to these perpetrators is often not enough to heal the pain that it causes women who deserve to have a harassment-free digital life like they do in their physical surroundings.<\/span><\/p>\n<p><b>Cyberbullying and Phishing Scams Are Real Problems<br \/>\n<\/b><span style=\"font-weight: 400;\">A group of seven adults between the ages of 21 and 25 went undercover to a high school to discover what <\/span><a href=\"http:\/\/www.businessinsider.com\/undercover-high-teenagers-lives-2018-2\"><span style=\"font-weight: 400;\">teenagers are like these days<\/span><\/a><span style=\"font-weight: 400;\">. One common problem that they discovered is cyberbullying and the pain it causes the victims. While bullying has always existed, the presence of the Internet makes it easy for cyberbullying to exist around the clock. Some teenage girls who\u2019ve been victims of cyberbullying have succumbed to depression or worse. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another common issue is phishing scams that target women, some of which are romance scams where a website lists women as being a 100% match of a potential partner. After talking to the person for a while, the prospective partner will then ask for a large sum of money as a loan to get out of a difficult situation. Avoid these scams at all costs.<\/span><\/p>\n<p><b>How Can You Protect Yourself?<br \/>\n<\/b><span style=\"font-weight: 400;\">For cyberbullying, parents and teachers have developed programs to mitigate this problem but responsibility also lies in empowering young women to be strong, confident and practice self-love throughout those difficult years. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protection can be a frustrating exercise for women who are stalked online. But a good rule is to shut down sharing settings on your social accounts, never engage with a cyberstalker, and keep detailed records of any stalking incidents to share with the authorities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since phishing or malware attacks are a reality, women are encouraged to keep a close eye on their security features in apps, and then employ something like<a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=Celebrate_Your_Own_Cybersecurity_Day\" target=\"_blank\" rel=\"noopener\"> dfndr s<\/a><\/span><span style=\"font-weight: 400;\">ecurity<\/span><span style=\"font-weight: 400;\"> which can scan your Android phone for viruses and malware, or detect malicious links with advanced anti-hacking technology before you even click on one.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thankfully, some developers have created apps that help women protect themselves from being the victims of physical attacks. One such app is Lifeline Response, which tracks a woman\u2019s movements and calls the police instantly if something happens. Users place their thumb on the screen while using it, and if they take their thumb off, an alarm sounds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In some cases, the app can ensure that police respond in just over a minute. Lifeline Response costs about $5 a month and it is available on Android.<\/span><\/p>\n<p><b>Contact the Authorities After a Cyberattack<br \/>\n<\/b><span style=\"font-weight: 400;\">One way you can report an online criminal act is through <\/span><a href=\"https:\/\/www.dhs.gov\/how-do-i\/report-cyber-incidents\"><span style=\"font-weight: 400;\">Homeland Security\u2019s \u2018Report Cyber Incidents\u2019<\/span><\/a><span style=\"font-weight: 400;\"> page. You can also use the <\/span><a href=\"http:\/\/www.iacpcybercenter.org\/resource-center\/incident-reporting\/\"><span style=\"font-weight: 400;\">Law Enforcement Cyber Center<\/span><\/a><span style=\"font-weight: 400;\"> to report cyber attacks, in addition to contacting your local authorities and launching an investigative case. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the recent #MeToo and #TimesUp movements, women\u2019s voices have never been stronger. Right now is the time to take a stake in your physical and online worlds by making sweeping changes that will reverberate for future generations of young girls and women worldwide.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To honor International Women\u2019s Day, here are some ways to empower your own cybersecurity. <\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[942,218,358,249],"class_list":["post-16932","post","type-post","status-publish","format-standard","hentry","category-security","tag-app0","tag-privacy","tag-protection","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16932"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16932\/revisions"}],"predecessor-version":[{"id":17986,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16932\/revisions\/17986"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}