• Skip to primary navigation
  • Skip to main content
S2 Grupo

Spanish Company Specialized in Cybersecurity

  • Company
    • About Us
    • Governing Bodies
    • CSR
    • Awards and Acknowledgments
  • Specialization
    • OT Industry
    • IT
    • OT Health
  • Solutions
  • R&D+I
  • Talent
  • News & Publications
  • Contact
  • facebook
  • twitter
  • instagram
  • linkedin
|
en arrow down
  • es
© 2022 S2 Grupo
Corporate

Keys to Prevent Cyberbullying: protect digital identity, devices, Internet Connection and Social Networks

25 May 2018
  • S2 Grupo has pointed out that cyberbullying has become the digital version of gender violence.
  • To prevent this, the company's team of experts has drawn up a decalogue with recommendations on cybersecurity so that women who have been victims of male violence and/or harassment can protect themselves in the use of new technologies.
  • The lack of awareness of the real risks that can be associated with accepting people we do not know in Social Networks, activating geolocation in applications and the "dictatorship" of "likes" as a means of acceptance and/or social recognition, is which mainly endangers women in this situation.

The company S2 Grupo, which specializes in cybersecurity, has warned that it is very important to raise awareness and provide training on the secure use of new technologies in order to employ them properly and avoid possible risks arising from their use, which is particularly important in the case of women who have been victims of abuse and/or harassment. "Many times the harasser or the abuser takes advantage of  all the information that Social Networks, smartphones or computers give us, for example, to know where his victim is, who she is with, what she is doing, which undoubtedly poses a huge risk", said José Rosell, managing partner of S2 Grupo. "In the same way that the use of technologies increases every year, the number of cases of cyberbullying increases. We must bear in mind that it has become the digital version of gender violence and to eradicate it, it is essential to train and raise awareness of society in general and of women who have been victims of it, especially", said Miguel A. Juan, managing partner of S2 Grupo. Given this situation, the S2 Grupo team of experts has drawn up a decalogue to prevent cyberbullying. As they have pointed out, an optimal cyber-protection will be aimed at protecting the four main entry doors of a potential cyber-stalker, which are digital identity, technological devices, Internet and Wi-Fi connections and Social Networks. "In addition to all the basic security tips, in the case of women who have been victims of gender violence, the most important thing they should take into account is what information they publish on Social Networks, especially if a program has been carried out to protect their location from the aggressor. All the information that is published on Facebook, Twitter, WhatsApp profiles, and even on the contact pages they enter to try to rebuild their lives, is data that the potential harasser can access to and it is very important that they bear in mind that they can find false profiles", explained José Rosell. "The main problem is that, even though they are frightened and have suffered really difficult situations, they often do not see the real danger to which they expose themselves by publishing their information on Social Networks with open profiles, connecting to contact websites, etc. In the end we find that the dictatorship of "likes" as a way of social acceptance and recognition, often puts them at risk without knowing it. That is why it is essential to develop an awareness campaign in this area", said Miguel A. Juan. Decalogue to prevent cyberbullying

  1. Protect your digital identity: we all have a digital identity and we must take care of it. Do you know what public information about you is on the web?
  2. Our digital identity is not only formed by the information we provide, but also by what others publish about us.
  3. Through our digital identity we can be giving a lot of information and that is why it is interesting to look for ourselves from time to time and find out what data we have by default.
  4. Be careful with the use of passwords. These are personal and should not be shared. They must be strong (composed of uppercase, lowercase, number and alphanumeric characters) and not related to personal data. In addition, it is important to change them periodically and not use the same one for everything. The use of password management applications may be useful.
  5. Protect your devices. To do this it is necessary to have an updated antivirus, an updated operating system and, in the same way, all applications are updated. In addition, if other people can have access to our computer or Smartphone we can limit the permissions of the actions that they can perform. It is also essential to cover the webcams when they are not being used. In the case of telephones, it is essential to ensure access to them through a password, pin or pattern.
  6. Remember that your mobile is yours, nobody should force you to show them your conversations or to activate the geolocation.
  7. Delete the mobile numbers of people with whom you no longer want to be in contact so that they do not access the information you provide in your WhatsApp profile or block them directly. Remember that WhatsApp conversations can be sent by mail if you need to save them.
  8. Regarding emails, it is essential to be wary of those where the subject matter has a high "urgency tone" or that incite to click on a link or download an attachment. We also need to verify that we know the sender of the emails.
  9. Protect your connections. To do this, it is very important to change the name of the home Wi-Fi and the password appears by default.
  10. Protect your environment and your networks: publish as much as you want, knowing the impact it may have, but do not let anyone force you to publish anything that you do not feel comfortable with or to send them information.
  11. Set up your Social Networks correctly. Do not admit people you do not know. Beware even of "friends of friends". Remember that anyone can create a false profile to contact you by pretending to be someone else. If you need to have proof of a comment on Social Networks, you can take a screenshot.
  12. Remember that applications that work with geo-positioning enabled may be giving a lot of information.
  13. Beware of publications that promise to "self-destruct" (Snapchat, WhatsApp states, etc...), because they create a false sense of security.

More information: prensa@s2grupo.es

  • fb
  • tw
  • in
Related Articles
Show all →
Corporate
S2 Grupo, in collaboration with the Chamber of Commerce of Valencia, presents the 1st International Master in Cyber intelligence
Leer más →
Corporate
The exponential growth of the types and number of cyber-attacks, main threat to the development of the business of organizations
Leer más →
Corporate
S2 Grupo and the CCN create a pioneering cyberattack analysis tool for the early detection of cyberthreats in Spain
Leer más →

Follow us in our newsletter

Subscribe through your email to stay up to date

S2 Grupo
© 2022 S2 Grupo
  • Press Center
  • Legal Disclaimer
  • Privacy Policy
  • Cookie policy
S2 Grupo utiliza cookies propias y de terceros para permitir tu navegación, fines analíticos y para mostrarte publicidad personalizada en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Clica aquí para acceder a nuestra Política de Cookies. Puedes aceptar todas las cookies pulsando el botón “ACEPTAR” o configurar o rechazar su uso pulsando el Botón “CONFIGURAR”
ConfigurarAceptar cookies
Manage consent

Resumen de Privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
pll_language1 yearThe pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA6 monthsThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
cookielawinfo-checkbox-functional1 yearThe cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necesaria1 yearSet by the GDPR Cookie Consent plugin to store the user consent for cookies in the category "Necessary".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
SAVE & ACCEPT
Powered by CookieYes Logo