{"id":20545,"date":"2020-03-06T15:40:09","date_gmt":"2020-03-06T20:40:09","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20545"},"modified":"2022-04-27T14:53:49","modified_gmt":"2022-04-27T18:53:49","slug":"staying-safe-on-international-womens-day-2020","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/staying-safe-on-international-womens-day-2020\/","title":{"rendered":"Staying Safe on International Women\u2019s Day 2020"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The original idea for International Women\u2019s day came from Clara Zetkin, who suggested the idea at an International Conference of Working Women in Copenhagen, Denmark, all the way back in 1910. The ideas was unanimously agreed upon by 100 women present, from 17 different countries, and the day was first celebrated on March 8, 1911, in Austria, Denmark, Germany and Switzerland. This day became re-energized as a\u00a0 focusing point for the women\u2019s movement in America in the late sixties, and won United Nations sponsorship in 1975. 2011 marked the International Women\u2019s Day 100th birthday. This year\u2019s109th celebration is placing an emphasis on individual experience sharpened with a generational message of opportunity\u2026 for earning true equality.<\/span><\/p>\n<h2><b>Here To Help You Celebrate Safely\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We wanted to do our part to help all of our women users celebrate this day by sharing some information that can help keep you safe while enjoying your time online. dfndr security is a great solution, but knowing as much as you can about crimes against women in particular in online environments should be helpful in keeping yourself safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Staying safe is the subject we know best, because we love to protect our users, and give everyone the best defense on their mobile devices.<\/span><\/p>\n<h2><b>Women Disproportionately Targeted Online<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The Women\u2019s Media Center Speech Project offers an outstanding (and very sobering) account of the dangers women face everyday online. We recommend you check out their extraordinarily helpful:<\/span><strong><a href=\"https:\/\/www.womensmediacenter.com\/speech-project\/online-abuse-101\"> Online Abuse 101<\/a><\/strong><span style=\"font-weight: 400;\">. The article includes a detailed description of some of the very cruel crimes women experience significantly more often than men:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sexual Extortion;<br \/>\n<\/span><span style=\"font-weight: 400;\">Doxing;<br \/>\n<\/span><span style=\"font-weight: 400;\">Revenge Pornography;<br \/>\n<\/span><span style=\"font-weight: 400;\">Financial Abuse;<br \/>\n<\/span><span style=\"font-weight: 400;\">Stalking.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the WMC article points out, both the kinds and degree of abuse suffered online is also different for women:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cWhen women are targeted, the abuse is more likely to be gendered, sustained, sexualized and linked to off-line violence. Women [\u2026] are the vast majority of the victims of nonconsensual pornography, stalking, electronic abuse and other forms of electronically-enhanced violence.\u201d<\/span><\/i><\/p>\n<h2><b>Staying On Guard<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Unfortunately, there are no easy-fixes to these escalating societal problems \u2014 which the fight for Equality in business and political domains only puts into harsher relief.\u00a0 But the steps women can take to protect themselves online do begin with the same basic steps used to prevent scams, identity theft, and other gender-neutral crimes. Let\u2019s review those briefly before we talk about what you can do if you are victimized\u2026.<\/span><\/p>\n<h2><b>General Online Security Steps<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>Be wary of people unknown to you.<\/strong><br \/>\nAlways be skeptical and very careful when approached by anyone unknown to you on the internet. Be especially wary if they ask for financial help or make requests for personal information of any kind. Even seemingly innocent questions about family relations, where you went to school, or whether or not you were at a particular event\u2026all can be ways of extracting more specific data about you. And of course, never share financial or personally identifying information with someone you don\u2019t know, or suspect of ill-will.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Never meet someone you only know online alone.<\/strong><br \/>\nThat\u2019s a simple rule, and a crucial one. Make it your rule too\u2026<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Pay close attention whenever the interaction feels odd or unusual.<br \/>\n<\/strong>Don\u2019t be afraid to block people who cross your boundaries.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Be exceedingly careful about sharing your personal information.<br \/>\n<\/strong>Personal and financial data, photos, and videos are constantly being targeted by malicious people to blackmail others for money, or worse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Know the rules and security settings for the social site you use, and report abuses promptly.<\/strong><br \/>\nYes, the \u201cSettings\u201d and \u201cSecurity\u201d pages can be a bit tedious at times, but learn the ropes and you\u2019ll feel (and be!) much safer. All major sites have good security capabilities: learn them and use them to your advantage.\u00a0 Also, learn how to report abuses and violations off site policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Use advanced security protection on your phone.<\/strong><br \/>\ndfndr security, for example, offers protection against scammers, scam links, identity theft, data leakage, and WhatsApp cloning. There are more than 15 functions on dfndr security aimed specifically to enhance your personal security and privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enable advanced sign-on security mechanisms such as two-factor authentication.\u00a0 With two-factor authentication, even if a scammer or blackmailer finds out your password, he\/she still won\u2019t be able to access your accounts.<\/span><\/p>\n<h2><b>What you should do if you are victimized?\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cWithout My Consent\u201d is an organization that was originally founded in 2011 with a mission to combat online invasions of privacy. They share information intended to empower individuals to stand up for their privacy rights and protect themselves. Their indispensable guide:<\/span><a href=\"https:\/\/withoutmyconsent.org\/resources\/\"> <span style=\"font-weight: 400;\"><strong>Something Can Be Done!<\/strong> <\/span><\/a><span style=\"font-weight: 400;\">\u00a0is one of the best online resources for learning the steps you can take if you\u2019re facing online privacy invasion, harassment, or worse. The following are a few general guidelines gleaned from their thorough resource:<\/span><\/p>\n<p><b>First, gather evidence. <\/b><span style=\"font-weight: 400;\"><br \/>\nThe specific and public record of data can be corroborated through technology \u2014 so gather all of the evidence you need. WMC\u2019s guide to<\/span><strong><a href=\"https:\/\/withoutmyconsent.org\/resources\/something-can-be-done-guide\/evidence-preservation\/\"> Evidence Preservation<\/a><\/strong><span style=\"font-weight: 400;\"> is very thorough and well worth reading in full!<\/span><\/p>\n<p><b>Then take steps to remove the defaming material.<\/b><span style=\"font-weight: 400;\"><br \/>\nContact companies \/ platforms and reference their policies to assure material in violation (like non-consensual pornography) is immediately taken down. Check this great resource from the<\/span><a href=\"https:\/\/perma.cc\/7RQ6-LJZL\"><span style=\"font-weight: 400;\"><strong> Cyber<\/strong> <strong>Civil Rights Initiative<\/strong><\/span><\/a><span style=\"font-weight: 400;\"> for more information on the specific steps to take.<\/span><\/p>\n<p><b>Report the crime.<\/b><span style=\"font-weight: 400;\"><br \/>\nTake all the evidence you are able to gather to the nearest police station and report it. You may want to access legal counsel as well, and you can also look into your state or local options for issuing a restraining order.<\/span><\/p>\n<p><b>Finally, remember that you\u2019re not alone.<\/b><span style=\"font-weight: 400;\"><br \/>\nSometimes reporting these crimes can be frightening, and difficult to do. One of the reasons we wanted to share these resources with you is to help you know what steps to take, and to enable you to act confidently, knowing that there are so many people, dedicated to helping you. (Many of them have been victims too!)\u00a0 Your friends and family can help you too.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Part of the spirit of equality of International Women\u2019s Day is reaching out across gender and generational lines to make things better for all women.\u00a0 Find your squad, reach out, and stay connected. Don\u2019t let cyber criminals isolate you: that\u2019s all part of how they work. Sticking together with your friends may be the best defense of all.\u00a0<\/span><\/p>\n<p><b>We Are With You, On This Important Day\u2026 And Everyday<\/b><\/p>\n<p><span style=\"font-weight: 400;\">We hope we\u2019ve been able to do our small part to help you enjoy a safer day and year ahead with this article. We\u2019ll continue to share the best resources we can find to help you protect yourself online \u2014 and the PSafe team will continue to do everything we can to help you use your devices with ever greater ease, confidence, and freedom.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With that, have a safe and inspiring International Women\u2019s Day.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I Am Generation Equality: Realizing Women\u2019s Rights<\/p>\n","protected":false},"author":83,"featured_media":20546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[12412,12409,12395,12411],"class_list":["post-20545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-revenge-porn","tag-scammers","tag-sextorsion","tag-stalking"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20545"}],"version-history":[{"count":4,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20545\/revisions"}],"predecessor-version":[{"id":20551,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20545\/revisions\/20551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20546"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}