Infradapt Blog

This is some blog description about this site

Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.


The Cybersmile Foundation was formed on June 17th, 2012, to help spread awareness of this problem and promote online inclusivity over toxic harassment and abuse. Unfortunately, their efforts are very much needed, as cyberbullying is still a pervasive problem.

What is a Cyberbully?

A cyberbully is pretty much what it sounds like: they are someone who torments others, causing them pain and angst, over a digital medium. Common media for a cyberbully to leverage include social media, online forums, and even texting and instant messaging. Since this form of harassment doesn’t require the bully and their target to be in the same place, there is a much greater timeframe of opportunity for this kind of bullying to take place. While many cyberbullies work alone, it isn’t uncommon for groups of people to engage in such activities cooperatively. Not only can this kind of bullying be very public, it can more insidiously be kept private, and many cyberbullies act anonymously to protect their own identities. Even worse, a total stranger may be the one to target someone as a victim of their attacks.

What possibly makes cyberbullying so insidious, is the fact that the target may not even be aware that it is going on. If, for instance, nasty things are being said on a social media platform or profile that the target cannot access, the only way they will find out is if someone says something - which doesn’t always happen.

Workplace Cyberbullying

While it may be known best as something that kids and adolescents have to contend with, cyberbullying has been seen among all age groups. This has only become more true in an increasingly digital workplace, where tools like email, instant messaging, and social media are leveraged for their productivity benefits. Considering this increase, it comes as no surprise that the workplace is becoming prime hunting grounds for cyberbullies. A study that polled almost 3,000 people found that 96 percent - yes, 96 - had been on the receiving end of workplace bullying.

Whether this cyberbullying takes the shape of gossip over instant messages between conspiring coworkers or a manager that sends abusive and unpleasant emails at intentionally inconvenient times, it creates a hostile work environment that erodes motivation and engagement and makes collaboration effectively impossible.

What Can Be Done

There are actions that both the recipient of cyberbullying and their employer can take to discourage this kind of unprofessional and hurtful behavior from occurring.

First, if the recipient of this kind of abuse is aware of the situation, they need to keep a cooler head and speak up for themselves. Calmly, rationally, and politely, the recipient should inform the perpetrating coworker that the behavior is to stop. Taking the high road, as it is with most interpersonal confrontations, is the best option when harassment is involved.

The receiving employee should also start collecting evidence. This will help them support their position if the time should come that they need to lodge a formal complaint. Keeping emails, social media posts, and other instances that they feel constitute abusive and hurtful behavior will give them what they need. Furthermore, they should also educate themselves on their rights as they pertain to their personal information. If some has been shared by the cyberbully, there could have been some laws broken. Neither defamation nor data protection are laughing matters.

An employer should want to create a working environment that runs smoothly, making it more likely to be productive. Harassment and cyberbullying throw a wrench in operations, so it only makes sense that an employer would want it to stop. Furthermore, the employer needs to make it clear to their employees that cyberbullying will not be tolerated. To do this, there should be a policy prepared that informs their employees what conduct will (and what conduct will not) be tolerated between employees, inside and outside of the office and work hours. This policy should be introduced during a new employee orientation, and if the issue was widespread enough, reviewed among the staff after an instance of workplace cyberbullying.

For more information about cyberbullying and additional resources, visit the official Stop Cyberbullying Day website. Technology is meant to help us grow as businesses, as people, and ultimately, as a society - not to tear each other down. Together, we can work to make that more the case.

Continue reading
0 Comment

Cybersecurity Requires Flexibility to Changes

Cybersecurity Requires Flexibility to Changes

Security is always changing due to the volatility of online threats and vulnerabilities. Things have changed so much over the past decade that solutions that worked back then are so outdated that they put your business at risk today. This brings into question what you should expect in the years to come. What are some of the threats that your business can expect to face in the future?


For reference, this information is from a study performed by Cisco. The study references the findings of 3,600 data security professionals from organizations such as Talos and others from all over the world.

Malware Has Grown More Autonomous
Early types of malware relied heavily on the user actually clicking on a link or downloading an attachment to install itself on their computer. Nowadays, malware doesn’t take the risk that the victim will know better than to click on a link or download something bad. Instead, a ransomware might be more network-based, meaning that all it takes is a simple mistake to spread to your entire infrastructure. Cisco suspects that this type of threat could potentially grow so widespread that it could take over the Internet.

Ransomware Is About More Than Just Money
Ransomware used to be all about making money and disrupting operations. It was a way to make money to fund further hacking attacks against even more victims. People would pay up because they were too scared to imagine losing their data. Trends are showing that hackers are increasingly more interested not in the financial side of ransomware, but with the destruction of businesses. Ransomware is being actively used by criminals to put an end to any business unfortunate enough to be hit by it.

Threats Are Avoiding Detection More Effectively
Ultimately, any online threat’s level of danger is equivalent to how easy it is to hide. The easier it hides, the more dangerous it can be. Ransomware can now hide in encrypted traffic to make itself much harder to detect. It can even use cloud-based applications and services to implement a command and control attack, all hidden within normal traffic.

Watch Out for Internet of Things Devices
The Internet of Things--a large collection of connected devices that all perform various functions--has grown at a considerable rate. Since Internet of Things devices are difficult to patch properly, they can provide backdoor access to an infrastructure. Since many IoT endpoints aren’t secured properly, your company network could potentially be opened up to all kinds of threats.

Security changes every day, but the one thing that never changes is that Infradapt can help your business secure its infrastructure. To learn more, reach out to us at 800.394.2301.

Continue reading
0 Comment

Security Concerns Have Led To New Voting Machines In Virginia

Security Concerns Have Led To New Voting Machines In Virginia

Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one--in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This uncertainty has led to some states making strides to ensure that their technology will no longer be responsible for such doubts.

Continue reading
0 Comment

3 Ways Your Business Can Prioritize Data Security

3 Ways Your Business Can Prioritize Data Security

In the wake of the Equifax data breach, which placed the personal information of 143 million users at risk, the issue of data security is at the forefront of social consciousness. Your organization needs to go about its daily business as if it will experience a data breach at any given moment. This involves looking at the worst-case scenario, and planning for it so that you’re never caught unaware.

Continue reading
0 Comment

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

Continue reading
0 Comment