I had the honor and privilege of presenting at the ASIS International 62nd Annual Seminar and Exhibits, held in Orlando, Florida in September. I focused my presentation on online harassment and cyber bullying, a challenge our clients face at times. The risk of becoming a victim of abuse online is increasing – and some of these attacks can escalate quickly and aggressively.

I thought it would be helpful to share some of my presentation’s content with others through our firm’s Executive Briefing series. With today’s post – and two additional ones in the days to come – I’ll share some of the key points I highlighted as well as a link to the Executive Briefing itself.

Security, Privacy and Social Media

When my colleagues and I meet with executives, high net worth individuals or Directors of Security who are concerned about cyberbullying and online harassment, we believe it’s important to keep a few things in mind. One of these key messages, for example, is that affluence and corporate position make more attractive targets. Another is that children, in addition to being targets of online harassment themselves, can sometimes increase the risk to the family as a whole with the content they post.

How to Counter the Risks of Online Harassment

  1. Manage your privacy settings. All of today’s major social media networks, from Facebook and Instagram to LinkedIn and Twitter, offer settings that allow the user to restrict who can see the user’s profile and posts and whether the posts disclose the user’s location, among countless other privacy specifications.
  2. Be judicious about what you share. Like a tattoo, consider everything you post online to be “in ink.” If you think you may regret sharing a message or piece of media, especially if that content could generate scrutiny or otherwise unwanted attention, you will want to think twice about posting it.
  3. Take advantage of social media monitoring. Social and open-source media monitoring options are available to help you protect against defamatory comments, impersonation of your identity and numerous other pitfalls. Think of them as your reputational metal detectors as you stroll along a beach of public commentary.

For More Information

To learn more about how to protect yourself, your family or your clients from electronic harassment, read our 360 Insight Executive Briefing “Security, Privacy and Social Media” by clicking the link below.


When tweets turn to threats: learn more about the risks.
Learn more