Account awareness#

Knowing your social media presence allows you to control what information about you is available online. This information can be used by abusers to track your locations, routines, contacts, or worse, create fake accounts that impersonate you and affect people in your life.

Reflective questions#

Before making changes, it helps to pause and think about safety:

  1. If I change or remove access to this account, could it cause someone to react in a way that makes me feel less safe?
  2. Do I want to make this change quietly or wait until I have support from someone I trust?
  3. Which account feels safest to review or adjust first?

Note: some changes like logging out devices or changing passwords can be noticeable to someone who has monitored accounts in the past. You do not need to do everything at once. It’s ok to start with low-risk steps and return to others later when you feel ready or supported.

How to have a safer online presence?#

Low-risk steps#

  1. List your accounts
  • Write down every social media account you can remember, even ones you do not use anymore.
  • Look up your name, username, phone number, and old emails in search bars on any social platforms to see what is public
  • Review privacy settings without changing them yet.

More visible steps (consider timing and support)#

  1. Check the email(s) and phone number(s) tied to your account

    Make sure only you can control the email(s) and phone number(s) associated with your accounts.

  2. Log out of all sessions

    Many platforms show where you are logged in. As a good safety practice, end all sessions, or at least end any session you do not recognize.

  3. Deactivate or delete unused accounts

    Keeping old accounts would create more attack surface for the attacker.

Multi-Factor Authorization#

Multi-Facctor Authorization also called MFA or two-factor authentication, adds an extra layer of protection to your accounts. In addition to your password, it requires a second step to verify that it is really you signing in. This second step might be a code sent to your phone, a prompt in an app, or a physical security key.

Using MFA can help prevent unauthorized access even if someone already knows or guesses your password.

How to enable Multi-Factor Authorization#

  • Go to the security or account settings for each social media platform you use.

  • Look for options labeled Multi-Factor Authorization, Two-Factor Authentication, or Login Security.

  • Follow the steps to turn it on.

Most platforms will offer several verification methods. If possible, consider the following options:

  • Authenticator app like Google Authenticator, Microsoft Authenticator, etc. which can be donwloaded from the application store. This is often the most secure option. An app on your phone generates a time-based code when you sign in.

  • Text message codes (codes are sent to your phone number via SMS message) This is more secure than using a password alone, but they may be less secure than an authenticator app.

  • Email-based codes (codes are sent to your email address) This can be helpful if you do not have access to a smartphone, but it relies on the security of your email account.

Things to consider before enabling MFA#

  • Make sure the email or phone number used for verification is one that only you control.
  • Save any backup or recovery codes in a secure place. These are important if you lose access to your phone.
  • If you share dvices or accounts with someone else, enabling MFA maybe noticeable. Again, consider timing and support before making this change.

Privacy Settings#

Changing your privacy settings on social media accounts can allow for you to maintain privacy while still connecting with those you want to connect with.

Private vs Public Accounts#

By default, most social media accounts are public, meaning anyone (even those who are not registered with the app) can get access to posts and content you post, as well as information about what and who you interact with. By contrast, a private account typically means that the account owner must approve follow/friend requests before a person can see their posts and interactions.

Changing this setting is usually located on the app or website’s account privacy settings. To verify that your account is private, try searching your account’s username on the app or website from an incognito browser or from an alternate account (you can create a temporary account to achieve this).

Tagged Posts#

One way many people accidentally end up sharing more information than they intend to is when people “tag” other people in posts that reveal personal information. For example, Alice might post about Bob’s birthday party, and tag Bob in that post. Then, people who can see that post now know when Bob’s birthday is, even if Bob doesn’t post about it.

To prevent unwanted information sharing, review posts you’ve been tagged in, and on most social networks, there will be an ability to remove the post from showing up on your profile. Additionally, you could ask the person to take down the original post.

Location Sharing#

Many social networking sites allow for the ability to link a location on a post. If you would like to share a location, try to be cautious of how specific this location is (for example, don’t link your home or work address) and when the post with the location is made (for example, informing your social network that you are on vacation as you are on vacation might also inform someone that your home is empty).

Content Controls#

If there is any content that you wish to not see as you are on social media, many sites also offer content or media controls, which is typically located in account settings or under privacy settings. Additionally, you can block accounts you don’t want to see content from (typically available on that account’s page or on the post itself). Furthermore, some social media sites such as X and TikTok allow you to say that you want to see less of a certain content by selecting more options on a post (the three dots in most cases) and choosing that option.

Recognizing common cyber abuse problems#

Doxxing#

What is Doxxing?#

Doxxing is a form of harassment with offenders tracking down a victim. To do this, they use a combination of publicly available information, hacks to obtain legally stored private information, and buying data off the dark web to track down their victim

How can I prevent Doxxing?#

  1. Beware of Public wifi networks!
    1. Vulnerable to many types of spying, such as someone looking over your shoulder (shoulder surfing), a malicious wifi network meant to disguise itself as another network (evil twin), or even camera footage that catches your screen in the video.
    2. If you must use one, be aware that information you enter and have open may not be secure. With this in mind, avoid accessing sensitive information in public places.
  2. Use settings on all social media accounts you use to keep your personal account private. Furthermore, be selective of who you allow to follow you, so undesirable people cannot see information posted on your account.
  3. Close unused accounts and request deletion of your information.

Fake Accounts (Impersonation)#

What are Fake Accounts?#

It is not uncommon to see fake accounts popping up on the social media you use, and while they usually seem like just a nuisance, they can have real dangers and consequences for users. If a fake account is created intending to impersonate you, they could harm your reputation to anyone who mistakenly believes that the account is yours. They could post things that damage your reputation, and people who know you could possibly mistake it as you.
Other user’s fake accounts are also a concern. If you follow a fake account thinking you followed someone else, any conversations you have with that account are not private and it is possible those behind the account could use the perceived trust to harm you. They could pose as a trusted individual asking for money, or ask for login information to an application

How can I be safe from Fake Accounts?#

  1. Report any fake accounts that you see, especially ones impersonating you

Some signs that should make you suspect an account is fake are:

  • a very high number of people that account follows compared to a low number of followers
  • a suspicious link on the page
  • misspellings of names, a lack of posts
  • a lack of mutual friends.
  1. Be cautious ever messaging an account sensitive information, from financial information to your location

Online Trolling/Harassment#

What is Trolling?#

Trolling is the act of deliberately posting or sharing offensive or provocative information online to elicit a reaction. Whether it is hate speech targeted at your demographic, or more targeted posts meant to make you feel bad, unwanted messages and posts can be hurtful. It can be done in different levels of severity, with some offenders going as far as stalking your social media accounts, sending frequent and harmful messages, and making more serious threats to your safety.

How can I be safe from Trolling and harassment?#

  1. Make social media accounts private to prevent unwanted people from seeing your account and messaging you.
  2. Avoid giving online trolls reactions, as this can encourage them to continue with their behavior.
  3. Use features such as blocking, muting, and reporting to stop offenders from being able to reach you.
  4. If your safety is threatened, go to the police. In the case safety is in question, DO NOT delete any messages or evidence, as any information the offender has given you could be of use to the police to find that individual

Escalation#

When should I escalate a response to the authorities?#

For incidents when an offender is targeting a group of people that includes you, it is likely that you are not personally in danger. For these types of posts, it is best to block these accounts, mute them from your feed, and report them for the malicious content they post. Avoid giving these accounts reactions, as their main goal is to try and elicit a reaction from you.  
Sometimes, however, certain online threats can be much more serious. It is possible a stalker can find you online, and try and track you down. It is also possible a stalker/harasser is someone that has met you in real life and can find more information about you online. Regardless, when a threat can possibly affect your safety, it is a large concern and something that should be taken seriously.  

Some signs to look for that you should escalate to the authorities and could potentially be in danger:

  • Receiving direct threats of physical harm
  • Relentless harassment and cyberstalking
  • Receiving blackmail threats, such as threatening to expose intimate images
  • Leaking personal information, such as your location or a picture of your house, school, workplace, etc.

How can I escalate?#

  1. If in immediate physical danger, call 911 or another emergency line equivalent.
  2. Document everything:
    1. Keep all messages the offender sent you.
    2. Screenshot images sent and other account information relevant to the harassment.
  3. Contact the police presenting the evidence, and follow their instructions on how to proceed.

If you are in immediate physical danger, call 911!