Cyberbullying – an epidemic

Greg Price recently submitted an article to the Troy Messenger, Cyberbullying – an epidemic:

In 2006, I received a request that angered and horrified me. Law enforcement often call with requests to review computer evidence, sometimes, they request assistance in collecting the computer evidence. A state law enforcement agency requested assistance with collection of computer evidence from an active crime scene. I traveled to the site.

I was unaware of the nature of the crime, until my arrival. A child, not quite a teenager, committed suicide. Near the child, a laptop glowed eerily. Law enforcement did not want to interact with the laptop due to its changing contents, for fear of damaging possible evidence.

The laptop displayed active contents from a discussion board. I discovered that the child visited the discussion board seeking help. The digital hangout was popular among teenagers. The presence, while not designed with ill intentions, became a conduit for bullying. Young people visited the site, degraded one another, spoke poorly about themselves and others. The power of perceived anonymity was powerful: remain hidden behind a computer and lash out, act in a fashion that most would never contemplate in the physical world.

How to keep your online data protected

Greg Price recently submitted an article to the Troy Messenger, How to keep your online data protected, to share important safety information during National Cyber Security Awareness Month:

Statistically, most cyber security issues originate from end-user activity. In fact, nearly seventy-five percent of all reviewed security breaches began as the result of end-user action.

The statistics do not surprise most security practitioners. After all, currently, end-users are the dominant consumer of electronic resources – people deploy, configure and use the devices. The machines aren’t running everything, yet.

We end-users make mistakes. Those statistics include IT professionals and everyday users. Often IT professionals lack adequate skills and training. Perhaps they exhibited some talent or aptitude and became the “go-to computer person”. Clever use of modern technology is no substitute for proper training. Nearly one-third of all security breaches were the result of poor IT configuration and management, according to an annual IBM cyber security study. Have confidence in your IT resources. If a search engine is your technician’s preferred tool, perhaps looking elsewhere is appropriate.

Related News: Classes teach students to avoid cyberbullying

One new article link has been added to our Related News page. The Enterprise Ledger published an article titled Classes teach students to avoid cyberbullying.

EHS Assistant Principal Ricky Britt said he participated in an internet safety course last summer that detailed laws and acts enacted in recent years to protect children when they’re online. As part of these measures, schools have been asked to help educate students about cyberbullying — using technology, often social media sites like Facebook, to publicly humiliate, harass or threaten someone.

“Cyberbullying in this day and time is getting to be worse,” Britt said. “A lot of the incidents are just not surfacing.”

Source: The Enterprise Ledger