12 Useful Apps & Tools to Defend Against Online Harassment

 

Cyberstalking happens when stalking occurs in the virtual world. Stalking is defined by the law as “any person who willfully, maliciously, and repeatedly follows or willfully and maliciously harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family is guilty of the crime of stalking.” 

Stalkers use a variety of digital technology to harass their victims. Because many for-profit companies operate in the virtual world, and, according to Statista, used by 82% of the United States population, this industry is growing at an exponential rate. Laws and regulations around cyber crimes are regularly forming and changing. Are there apps and programs that can help victims of cyberstalking and online harassment to keep themselves safe?

Here are 12 helpful Apps and Programs that can help protect a victim from stalker harassment. 

  • TechSafety App

Tech Safety is an app designed to help explore online safety and digital privacy. This app includes resources for documenting and logging instances and getting help. 

https://techsafetyapp.org/

  • Delete Me

Data Brokers collect your personal information and sell it to other companies. Data brokers will post your personal information on search engines across the internet. Delete me can remove personal information from search engines fueled by Data Brokers. It costs an estimated $20.00 a month for up to two people to access the service, annual memberships apply. 

https://joindeleteme.com/

  • SAMHSA (youth app)

The KnowBullying Mobile App helps to build relationships between caregivers and children around the subject of cyberbullying. 

https://store.samhsa.gov/product/knowbullying

  • YouMail

This app can store voice mail messages and even organize them in folders. It can be useful for documenting stalker behavior involving voice mail messages.

https://www.youmail.com/

  • Password Manager

Password protection is key to keeping anyone from accessing your online accounts. Passwords should be unique; use a combination of uppercase and lowercase letters, symbols and numbers. If you are changing your passwords frequently to protect your personal information from a cyber stalker it is foreseeable that you may need help with keeping track of your passwords. Consider using a password manager such as RoboForm Everywhere or Dashlane. 

RoboForm

https://www.roboform.com/everywhere

Dashlane

https://www.dashlane.com/

  • Use Two-Factor Authentication

On your mobile app, you can access your privacy settings by tapping the hamburger icon ☰ on the upper-right corner (Android) or the lower-right corner (iOS) and scrolling down to the bottom to find the “Settings & Privacy” menu. Tap “Settings” → “Security and Login” and select “Use two-factor authentication.”

  • Intruder Detection Apps

These apps will take a photo of anyone who attempts to unlock your phone and send it directly to your email address. Search “intruder detection” in your device’s app store to select one that fits your needs. 

  • Call Forwarding

If you are unable to block the stalker from your device or have fear over the ramifications of this action, you can upload a third party app with a call forwarding feature.

  • Use your Email Folders

Stay organized by creating an email folder dedicated to storing online messages from the stalker to add to your Stalker Behavioral Log.

  • Cloud Storage

If you suspect a cyberstalker is attempting to access your personal information by stealing your device or hacking your account, consider using backup storage in a Cloud Service. If the intruder does access your device or attempts to delete your personal information, you can have a backup of your important information in Google Drive, Dropbox, or OneDrive. 

  • NCTCC Mobile App

The NCTCC Mobile App contains several Safety Plans. If you feel that your safety is in jeopardy, consider creating a safety plan for you and your family. 

https://nctcc.org/nctcc-app/

  • Stalker Behavior Log

It is important to document instances of stalker harassment. Take screenshots and save emails. While not necessarily an app, this log can be stored online and backed up in a cloud service such as Google Drive, Dropbox, or OneDrive. 

While cyberstalkers pose a threat to a victim’s private information and security, there are best practices and defensive technology that can help. 

To visit the Safety Section of the NCTCC App and get more information on Stalking/Harassment Safety, download the NCTCC Victim Service Mobile Application at nctcc.org/nctcc-app or search for “nctcc” in the Google Play or Apple Store.

The Weaving Wellness Library has been made possible in part by a grant from the National Endowment for the Humanities: Sustaining Humanities through the American Rescue Plan in partnerships with the Association of Tribal Archives, Libraries, and Museums.

Any views, findings, conclusions, or recommendations expressed in this blog do not necessarily represent those of the Association of Tribal Archives, Libraries, and Museums or the National Endowment for the Humanities.

App Defense Against Online Harassment


 
Previous
Previous

7 Types of Cyber Misbehavior

Next
Next

8 Ways You Can Defend Against Cyber Stalking