{"id":8305,"date":"2021-01-28T17:31:18","date_gmt":"2021-01-28T22:31:18","guid":{"rendered":"https:\/\/www.safehorizon.org\/?p=8305"},"modified":"2025-06-10T13:16:00","modified_gmt":"2025-06-10T17:16:00","slug":"protect-yourself-from-cyberstalking","status":"publish","type":"post","link":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/","title":{"rendered":"Eight Tips to Protect Yourself from Cyberstalking"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8307\" src=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\" alt=\"8 Tips to Protect Yourself from Cyberstalking\" width=\"600\" height=\"289\" srcset=\"https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg 1476w, https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-300x145.jpg 300w, https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-1024x493.jpg 1024w, https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-768x370.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><em>January 28, 2021<br \/>\nBy Wendell Thomas<\/em><\/p>\n<p><span data-contrast=\"auto\">As a society, we have been relying on and using digital technology more and more to connect and live. T<\/span><span data-contrast=\"auto\">he COVID-19 pandemic has moved\u00a0<\/span><span data-contrast=\"auto\">us more into the digital space as we\u00a0<\/span><span data-contrast=\"auto\">work-from-home,\u00a0<\/span><span data-contrast=\"auto\">virtually attend<\/span><span data-contrast=\"auto\">\u00a0school, and us<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">\u00a0electronic forms of communication\u00a0<\/span><span data-contrast=\"auto\">24\/7\u00a0<\/span><span data-contrast=\"auto\">as a way of life<\/span><span data-contrast=\"auto\">. This means that<\/span><span data-contrast=\"auto\">\u00a0increased knowledge about cybercrime is more important now than ever.<\/span><span data-contrast=\"auto\"> While January is recognized as National Stalking Awareness Month,\u00a0<\/span><span data-contrast=\"auto\">we should also raise awareness<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">of cyberstalking at any time during the year<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0what is cyberstalking and what are the steps you can take to protect yourself?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What is\u00a0<\/span><\/b><b><span data-contrast=\"auto\">S<\/span><\/b><b><span data-contrast=\"auto\">talking?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Most of us might be aware of the meaning of stalking. We&#8217;ve either have experienced it first-hand, know someone who experienced\u00a0<\/span><span data-contrast=\"auto\">it or<\/span><span data-contrast=\"auto\">\u00a0ha<\/span><span data-contrast=\"auto\">ve<\/span><span data-contrast=\"auto\">\u00a0seen it in movies or television.\u00a0<\/span><span data-contrast=\"auto\">Stalking<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">can\u00a0<\/span><span data-contrast=\"auto\">involve secretly following the victim, consistent and devious phone calls, sending unwanted gifts, and other means of unwanted physical contact.\u00a0\u00a0<\/span><span data-contrast=\"auto\">For more information on stalking behaviors, <a href=\"https:\/\/www.safehorizon.org\/get-informed\/stalking-statistics-facts\/\">visit our facts about Stalking page<\/a>.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What is\u00a0<\/span><\/b><b><span data-contrast=\"auto\">C<\/span><\/b><b><span data-contrast=\"auto\">yberstalking?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Like stalk<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">, cyberstal<\/span><span data-contrast=\"auto\">king is\u00a0<\/span><span data-contrast=\"auto\">intended<\/span><span data-contrast=\"auto\">\u00a0to threaten, harass, and embarrass<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">only<\/span><span data-contrast=\"auto\">\u00a0with cyberstalking<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">technology\u00a0<\/span><span data-contrast=\"auto\">is used. The technology<\/span><span data-contrast=\"auto\">\u00a0used by\u00a0<\/span><span data-contrast=\"auto\">cyberstalkers<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">can include\u00a0<\/span><span data-contrast=\"auto\">social media, email, instant messaging (text and SMS), computers, mobile\u00a0<\/span><span data-contrast=\"auto\">devices,<\/span><span data-contrast=\"auto\">\u00a0and information available on the Internet.\u00a0<\/span><span data-contrast=\"auto\">Over the past ten years, i<\/span><span data-contrast=\"auto\">nstances of reported cyberstalking have risen as stalkers have more access to victims&#8217; personal information from online and social media platforms.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cyberstalking poses additional\u00a0<\/span><span data-contrast=\"auto\">threats,<\/span><span data-contrast=\"auto\">\u00a0such as sexual harassment, sexual extortion, and damaging a\u00a0<\/span><span data-contrast=\"auto\">person\u2019s<\/span><span data-contrast=\"auto\">\u00a0reputation. When you add physical and cyberstalking, the threats are compounded and pose more significant harm.\u00a0<\/span><span data-contrast=\"auto\">Our new normal, being totally virtual for work, school<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0and a host of other activities, makes it easier for\u00a0<\/span><span data-contrast=\"auto\">cyberstalkers<\/span><span data-contrast=\"auto\">\u00a0and cyberbullies to track and harass\u00a0<\/span><span data-contrast=\"auto\">users<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>Here a few key tips to safety plan against cyberstalking:\u00a0<\/strong><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Search your full name<\/span><\/b><b><span data-contrast=\"auto\">\u00a0with your city and state<\/span><\/b><span data-contrast=\"auto\">\u00a0on Google or your preferred search engine.\u00a0<\/span><span data-contrast=\"auto\">This<\/span><span data-contrast=\"auto\">\u00a0can\u00a0<\/span><span data-contrast=\"auto\">show you any\u00a0<\/span><span data-contrast=\"auto\">information about you\u00a0<\/span><span data-contrast=\"auto\">that<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">publicly<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">available online.\u00a0\u00a0<\/span><span data-contrast=\"auto\">This can be<\/span><span data-contrast=\"auto\">\u00a0an ideal step\u00a0<\/span><span data-contrast=\"auto\">as\u00a0<\/span><span data-contrast=\"auto\"><span data-contrast=\"auto\">you adjust your online privacy settings.<\/span><\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Check your credit report regularly.\u00a0\u00a0<\/span><\/b><span data-contrast=\"auto\">You are entitled to a free credit report once a year from the three credit reporting companies<\/span><span data-contrast=\"auto\">\u00a0which are\u00a0<\/span><span data-contrast=\"auto\">Equifax,\u00a0<\/span><span data-contrast=\"auto\">Experian,<\/span><span data-contrast=\"auto\">\u00a0and TransUnion.\u00a0<\/span><span data-contrast=\"auto\">You can also<\/span><span data-contrast=\"auto\"><span data-contrast=\"auto\">\u00a0sign up for free credit monitoring services such as Credit Karma, which will provide alerts on your credit report activity.<\/span><\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Do not accept \u201cFriend Requests\u201d<\/span><\/b><b><span data-contrast=\"auto\">\u00a0from strangers.\u00a0<\/span><\/b><span data-contrast=\"auto\">Remember when you were a kid, and your parents told you\u00a0<\/span><span data-contrast=\"auto\">\u201c<\/span><span data-contrast=\"auto\">don<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\">t talk to strangers<\/span><span data-contrast=\"auto\">?\u201d<\/span><span data-contrast=\"auto\">\u00a0This advice also applies online.\u00a0\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">O<\/span><span data-contrast=\"auto\">n<\/span><span data-contrast=\"auto\">ly\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">ccept\u00a0<\/span><span data-contrast=\"auto\">f<\/span><span data-contrast=\"auto\">riend\u00a0<\/span><span data-contrast=\"auto\">r<\/span><span data-contrast=\"auto\">equests from people you have met in person.<br \/>\n<\/span><b><span data-contrast=\"auto\">Review and update your social media profile<\/span><\/b><b><span data-contrast=\"auto\">.\u00a0<\/span><\/b><span data-contrast=\"auto\">Wh<\/span><span data-contrast=\"auto\">en creating a handle, t<\/span><span data-contrast=\"auto\">ry to<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">choose gender<\/span><span data-contrast=\"auto\">-neutral<\/span><span data-contrast=\"auto\">\u00a0and age-neutral profile\u00a0<\/span><span data-contrast=\"auto\">name. You can also<\/span><span data-contrast=\"auto\">\u00a0a<\/span><span data-contrast=\"auto\"><span data-contrast=\"auto\">sk your friends and family never to give out your details to anyone.<\/span><\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Review your social media privacy settings<\/span><\/b><span data-contrast=\"auto\">.\u00a0 For instance, on Facebook, change your security settings only to allow friends to post on your wall.\u00a0 Turn off facial recognition because if a friend posts a picture of you, Facebook recognizes you and automatically tags you to the image. Turn off location services on Facebook and other social media platforms such as Instagram.\u00a0 Location services can help you discover cool places near you but can also be used to pinpoint the neighborhood you live in or the hip brunch spot you will meet your friends.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><br \/>\n<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Change your passwords frequently<\/span><\/b><span data-contrast=\"auto\">.\u00a0 It can be once a month or\u00a0<\/span><span data-contrast=\"auto\">once\u00a0<\/span><span data-contrast=\"auto\">every three months.\u00a0 You can set a reminder to change your password.\u00a0 Create passwords using phrases that are easy to remember, or if your\u00a0<\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">nternet browser recommends a password, use it, and document it.\u00a0 For additional protection, take advantage of your bank, social media, email provider<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\"><span data-contrast=\"auto\">s two-factor authentication (2FA). If someone gets ahold of your password, they will also have to enter a PIN, and you will be alerted about the attempt to access your account.<\/span><\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Take the time to secure your computer and mobile device<\/span><\/b><span data-contrast=\"auto\">\u00a0(phones and tablets)<\/span>\n<ul>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Avoid sending personal information over public Wi-Fi.\u00a0 Do not conduct financial or personal business where you may enter social security and other private information while surfing at Starbucks or places with access to free Wi-Fi.\u00a0 Instead, do personal business on a secure private network or utilize a virtual private network (VPN).<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use anti-virus and anti-spyware software to scan your computer for viruses and spyware.\u00a0 A stalker can remotely install spyware on your computer to send everything you type back to them.\u00a0 Keep your anti-virus and anti-spyware up to date and run scans frequently.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Cover your webcam when not in use.\u00a0 You will be surprised to know that even Facebook<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\"><span data-contrast=\"auto\">s Mark Zuckerberg covers his webcam.<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Never open attachments or click on links in an email<\/span><\/b><span data-contrast=\"auto\"><span data-contrast=\"auto\">\u00a0from people you do not know or trust.<\/span><\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Be careful what you post online<\/span><\/b><span data-contrast=\"auto\">.\u00a0 The more information you post about yourself, the more information someone can use to stalk you.\u00a0 Do not post your home address, phone number,\u00a0<\/span><span data-contrast=\"auto\">or personal information like your\u00a0<\/span><span data-contrast=\"auto\">favorite coffee shop.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">How to report cyberstalking<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Although cyberstalking laws differ from state<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">to<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">state, you should still consider reporting\u00a0<\/span><span data-contrast=\"auto\">any stalking activity\u00a0<\/span><span data-contrast=\"auto\">to your local law enforcement agency.\u00a0 The process\u00a0<\/span><span data-contrast=\"auto\">may<\/span><span data-contrast=\"auto\">\u00a0not be as fast as you see on TV detective dramas, and it may take some time to resolve. Your first\u00a0<\/span><span data-contrast=\"auto\">impulse<\/span><span data-contrast=\"auto\">\u00a0might be to delete the stalker<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\">s messages or\u00a0<\/span><span data-contrast=\"auto\">recordings,\u00a0however<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">these digital records can help you build a case.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Try to keep\u00a0<\/span><span data-contrast=\"auto\">digital records\u00a0<\/span><span data-contrast=\"auto\">or copies\u00a0<\/span><span data-contrast=\"auto\">of harassing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">emails, messaging, recordings, and screenshots as evidence.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">You can also report the stalker to the<\/span><i><span data-contrast=\"auto\">\u00a0<\/span><\/i><span data-contrast=\"auto\">platform\u00a0<\/span><span data-contrast=\"auto\">on which the harassment occurs. For example, you can go to the Facebook Help Center for instructions on what to do if\u00a0<\/span><span data-contrast=\"auto\">you<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\">re<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">cyber<\/span><span data-contrast=\"auto\">stalked. It could take some time, but most social media\u00a0<\/span><span data-contrast=\"auto\">platforms\u00a0<\/span><span data-contrast=\"auto\">and websites have strict policies against stalking.\u00a0<\/span><span data-contrast=\"auto\">After reporting, you could<\/span><span data-contrast=\"auto\">\u00a0block the stalker and stop interacting with them.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Though cyberstalking remains a constant threat, being\u00a0<\/span><span data-contrast=\"auto\">vigilant and<\/span><span data-contrast=\"auto\">\u00a0taking\u00a0<\/span><span data-contrast=\"auto\">some of\u00a0<\/span><span data-contrast=\"auto\">these steps\u00a0<\/span><span data-contrast=\"auto\">will help\u00a0<\/span><span data-contrast=\"auto\">safeguard\u00a0<\/span><span data-contrast=\"auto\">yourself against<\/span><span data-contrast=\"auto\">\u00a0it.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you are a victim of cyberstalking and seeking help, please call Safe Horizon\u2019s hotline at 1(800) 62<\/span><span data-contrast=\"auto\">1<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">4673 (<\/span><span data-contrast=\"auto\">HOPE<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">\u00a0or visit our website at <a href=\"https:\/\/www.safehorizon.org\/get-help\/stalking\/\">https:\/\/www.safehorizon.org\/get-help\/stalking\/<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To be safe in our digital world, it&#8217;s important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.<\/p>\n","protected":false},"author":12,"featured_media":{"id":8307,"alt_text":"8 Tips to Protect Yourself from Cyberstalking","caption":"","description":"","media_type":"image","media_details":{"width":1476,"height":711,"file":"2021\/01\/iStock-CyberStalking-Jan2021.jpg","sizes":{"medium":{"file":"iStock-CyberStalking-Jan2021-300x145.jpg","width":300,"height":145,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-300x145.jpg"},"large":{"file":"iStock-CyberStalking-Jan2021-1024x493.jpg","width":1024,"height":493,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-1024x493.jpg"},"thumbnail":{"file":"iStock-CyberStalking-Jan2021-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-150x150.jpg"},"medium_large":{"file":"iStock-CyberStalking-Jan2021-768x370.jpg","width":768,"height":370,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021-768x370.jpg"}},"image_meta":{"aperture":"2.8","credit":"Getty Images\/iStockphoto","camera":"ILCE-7RM2","caption":"Cyber security with person using a laptop on a white table","created_timestamp":"1471046400","copyright":"","focal_length":"35","iso":"1600","shutter_speed":"0.005","title":"Cyber security with person using a laptop","orientation":"0","keywords":[]}},"post":8305,"source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg"},"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2015],"tags":[1103,485,290,1531,1371,1101,635],"class_list":["post-8305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safe-blog","tag-cybersecurity","tag-cyberstalking","tag-stalking","tag-tech-abuse","tag-tech-safety","tag-technology","tag-technology-facilitated-stalking","issue-stalking","issue-victims-of-other-abuse"],"acf":{"page_header_title":"","title_font_size":"42","page_header_excerpt":"","sub-headline_placement":false,"page_header_image":false,"custom_scripts":false,"show_author_bio":true,"create_custom_authors":true,"authors":[{"author_name":"Wendell Thomas"},{"author_name":""}],"related_initiative_title":"Get Help","related_initiative_link":"https:\/\/www.safehorizon.org\/get-help\/stalking\/","related_initiative_link_text":"Support for Stalking Survivors","featured_posts":[{"ID":5304,"post_author":"13","post_date":"2018-02-12 20:45:09","post_date_gmt":"2018-02-12 20:45:09","post_content":"<img class=\"aligncenter wp-image-5307\" src=\"http:\/\/www.safehorizon.org\/wp-content\/uploads\/2018\/02\/Am-I-Being-Stalked-5-Signs-To-Look-For-e1518467698461.jpg\" alt=\"Am I Being Stalked? 5 Signs To Look For\" width=\"700\" height=\"467\" \/>\r\n\r\n<em>By La-Keir Morris\r\n<\/em><em>January 31, 2018<\/em>\r\n\r\nStalking is a serious crime that affects millions of people. According to the Center for Disease Control, approximately 1 in 6 women and 1 in 19 men have experienced stalking at some point during their lives. Since stalking is so prevalent and can often be dangerous, it is important to recognize stalking behavior and how to get help when you or someone you know is being stalked.\r\n\r\n<strong><u>What is Stalking?<\/u><\/strong>\r\n\r\nStalking is a pattern of willful behavior engaged in by an individual or group towards another person. Stalking behaviors are often threatening, coercive, and intimidating to the victim. The pattern of behavior by the stalker may include, but is not necessarily limited to, following the victim or obsessively monitoring the victim. The behavior can cause harm to the emotional and mental health of the victim as well as harm to their physical health, property or safety.\r\n\r\nHere are some common stalking behaviors to help you identify if you or a friend is being stalked.\r\n<h2>1. Cyberstalking<\/h2>\r\nCyberstalking is when someone uses technology to intimidate you or to monitor your behavior. An example might be when a person repeatedly and unwantedly reads your personal emails as a means of tracking you or your whereabouts. Sending threats via text, or gathering information that may be used to harass you are also examples of cyberstalking. Using social media sites such as Facebook, Twitter, or Instagram to spread false rumors or accusations that make you fear for your physical or emotional safety are also considered cyberstalking. <a href=\"https:\/\/www.safehorizon.org\/programs\/ibm-safe-horizon-address-cyberstalking\/\">For more information on cyberstalking, click here.<\/a>\r\n<h2>2. Unannounced and Unwanted Visits<\/h2>\r\nDoes your partner or someone else show up unexpectedly at places such as your workplace, gym, or even your home? If these behaviors make you feel uncomfortable or afraid, consider that it may be stalking, even if on the surface these behaviors seem innocent or innocuous.\r\n<h2>3. Sending Unwanted Gifts<\/h2>\r\nStalkers can send gifts such as flowers, letters, and photos to try to persuade you to begin or to resume a relationship, however unwanted and unsolicited this attention may be. For example, I worked with a survivor whose former intimate partner left pictures of them together after work meetings. Another found flowers on her desk. Her co-workers thought they were beautiful, but for her, they were a sign of danger.\r\n<h2>4. Attempting to Obtain Information from Others<\/h2>\r\nStalkers may reach out to friends, family or coworkers to get in touch with the survivor. They may lie to others and tell them that it\u2019s an emergency in order to get information about the survivor\u2019s whereabouts.\r\n<h2>5. Vandalizing or Damaging Your Property<\/h2>\r\nWhen stalkers retaliate, they can take it out on the survivor\u2019s property. This includes anything from scratching cars and slashing tires to writing offensive messages on their homes or posting private documents or photos on social media.\r\n<h1>Get Help<\/h1>\r\n<strong>You are not alone; it is not your fault; help is available.<\/strong>\r\n\r\nIf at any point you feel something is not right or you fear for safety, you can reach out to an advocate to get the support and help that you need. Many survivors may not realize they are being stalked because the behaviors seem minor or harmless when you describe them to others.\r\n\r\nSafe Horizon\u2019s 24-hour anonymous hotline is staffed with trained advocates who can provide a listening ear. Call us at 1-800-621\u2013HOPE (4673) or <a href=\"https:\/\/www.safehorizon.org\/hotlines\/\">visit our Hotlines page for more information<\/a>.\r\n\r\nThe Victim Connect Helpline and Resource Center was created by The National Center for Victims of Crime to provide information and referrals for victims of all crime. The National Resource Hotline is available to help anyone around the nation. You can call their Helpline at 855-4-VICTIM (855-484-2846) or <a href=\"https:\/\/victimconnect.org\">visit their survivor help website here<\/a>.","post_title":"\"Am I Being Stalked?\": 5 Signs To Look For","post_excerpt":"How can you recognize stalking behavior? Read these 5 signs of stalking to know if you or someone you know is being stalked and how to get help.","post_status":"publish","comment_status":"closed","ping_status":"open","post_password":"","post_name":"am-i-being-stalked-5-signs","to_ping":"","pinged":"","post_modified":"2025-06-10 13:45:46","post_modified_gmt":"2025-06-10 17:45:46","post_content_filtered":"","post_parent":0,"guid":"http:\/\/www.safehorizon.org\/?p=5304","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"original_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Eight Tips to Protect Yourself from Cyberstalking<\/title>\n<meta name=\"description\" content=\"To be safe in our digital world, it&#039;s important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eight Tips to Protect Yourself from Cyberstalking\" \/>\n<meta property=\"og:description\" content=\"To be safe in our digital world, it&#039;s important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\" \/>\n<meta property=\"og:site_name\" content=\"Safe Horizon\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/safehorizon\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-28T22:31:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T17:16:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1476\" \/>\n\t<meta property=\"og:image:height\" content=\"711\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob D\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@safehorizon\" \/>\n<meta name=\"twitter:site\" content=\"@safehorizon\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob D\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\"},\"author\":{\"name\":\"Rob D\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/8c2f7bb49db875364f0056040411a2b2\"},\"headline\":\"Eight Tips to Protect Yourself from Cyberstalking\",\"datePublished\":\"2021-01-28T22:31:18+00:00\",\"dateModified\":\"2025-06-10T17:16:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\"},\"wordCount\":1066,\"publisher\":{\"@id\":\"https:\/\/www.safehorizon.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\",\"keywords\":[\"Cybersecurity\",\"Cyberstalking\",\"Stalking\",\"tech abuse\",\"Tech Safety\",\"Technology\",\"technology-facilitated stalking\"],\"articleSection\":[\"Safe Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\",\"url\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\",\"name\":\"Eight Tips to Protect Yourself from Cyberstalking\",\"isPartOf\":{\"@id\":\"https:\/\/www.safehorizon.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\",\"datePublished\":\"2021-01-28T22:31:18+00:00\",\"dateModified\":\"2025-06-10T17:16:00+00:00\",\"description\":\"To be safe in our digital world, it's important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage\",\"url\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\",\"contentUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg\",\"width\":1476,\"height\":711,\"caption\":\"8 Tips to Protect Yourself from Cyberstalking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Safe Blog\",\"item\":\"https:\/\/www.safehorizon.org\/.\/safe-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eight Tips to Protect Yourself from Cyberstalking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safehorizon.org\/#website\",\"url\":\"https:\/\/www.safehorizon.org\/\",\"name\":\"Safe Horizon\",\"description\":\"Safety. Connection. Healing.\",\"publisher\":{\"@id\":\"https:\/\/www.safehorizon.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safehorizon.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safehorizon.org\/#organization\",\"name\":\"Safe Horizon\",\"url\":\"https:\/\/www.safehorizon.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png\",\"contentUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png\",\"width\":696,\"height\":696,\"caption\":\"Safe Horizon\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/safehorizon\",\"https:\/\/x.com\/safehorizon\",\"https:\/\/www.instagram.com\/safehorizon\/\",\"https:\/\/www.linkedin.com\/company\/safe-horizon\",\"https:\/\/www.youtube.com\/user\/SafeHorizonNY\",\"https:\/\/en.wikipedia.org\/wiki\/Safe_Horizon\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/8c2f7bb49db875364f0056040411a2b2\",\"name\":\"Rob D\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffedfdc79be37181106174eb0e1d6ab194b350a42ad7b667150cf34366d7856a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffedfdc79be37181106174eb0e1d6ab194b350a42ad7b667150cf34366d7856a?s=96&d=mm&r=g\",\"caption\":\"Rob D\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Eight Tips to Protect Yourself from Cyberstalking","description":"To be safe in our digital world, it's important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/","og_locale":"en_US","og_type":"article","og_title":"Eight Tips to Protect Yourself from Cyberstalking","og_description":"To be safe in our digital world, it's important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.","og_url":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/","og_site_name":"Safe Horizon","article_publisher":"http:\/\/facebook.com\/safehorizon","article_published_time":"2021-01-28T22:31:18+00:00","article_modified_time":"2025-06-10T17:16:00+00:00","og_image":[{"width":1476,"height":711,"url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg","type":"image\/jpeg"}],"author":"Rob D","twitter_card":"summary_large_image","twitter_creator":"@safehorizon","twitter_site":"@safehorizon","twitter_misc":{"Written by":"Rob D","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#article","isPartOf":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/"},"author":{"name":"Rob D","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/8c2f7bb49db875364f0056040411a2b2"},"headline":"Eight Tips to Protect Yourself from Cyberstalking","datePublished":"2021-01-28T22:31:18+00:00","dateModified":"2025-06-10T17:16:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/"},"wordCount":1066,"publisher":{"@id":"https:\/\/www.safehorizon.org\/#organization"},"image":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg","keywords":["Cybersecurity","Cyberstalking","Stalking","tech abuse","Tech Safety","Technology","technology-facilitated stalking"],"articleSection":["Safe Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/","url":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/","name":"Eight Tips to Protect Yourself from Cyberstalking","isPartOf":{"@id":"https:\/\/www.safehorizon.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage"},"image":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg","datePublished":"2021-01-28T22:31:18+00:00","dateModified":"2025-06-10T17:16:00+00:00","description":"To be safe in our digital world, it's important to learn about cybercrimes such as cyberstalking. Share these cyberstalking safety tips to help increase awareness.","breadcrumb":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#primaryimage","url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg","contentUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2021\/01\/iStock-CyberStalking-Jan2021.jpg","width":1476,"height":711,"caption":"8 Tips to Protect Yourself from Cyberstalking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.safehorizon.org\/safe-blog\/protect-yourself-from-cyberstalking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Safe Blog","item":"https:\/\/www.safehorizon.org\/.\/safe-blog\/"},{"@type":"ListItem","position":2,"name":"Eight Tips to Protect Yourself from Cyberstalking"}]},{"@type":"WebSite","@id":"https:\/\/www.safehorizon.org\/#website","url":"https:\/\/www.safehorizon.org\/","name":"Safe Horizon","description":"Safety. Connection. Healing.","publisher":{"@id":"https:\/\/www.safehorizon.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safehorizon.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.safehorizon.org\/#organization","name":"Safe Horizon","url":"https:\/\/www.safehorizon.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png","contentUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png","width":696,"height":696,"caption":"Safe Horizon"},"image":{"@id":"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/safehorizon","https:\/\/x.com\/safehorizon","https:\/\/www.instagram.com\/safehorizon\/","https:\/\/www.linkedin.com\/company\/safe-horizon","https:\/\/www.youtube.com\/user\/SafeHorizonNY","https:\/\/en.wikipedia.org\/wiki\/Safe_Horizon"]},{"@type":"Person","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/8c2f7bb49db875364f0056040411a2b2","name":"Rob D","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffedfdc79be37181106174eb0e1d6ab194b350a42ad7b667150cf34366d7856a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffedfdc79be37181106174eb0e1d6ab194b350a42ad7b667150cf34366d7856a?s=96&d=mm&r=g","caption":"Rob D"}}]}},"taxonomies":{"categories":[{"term_id":2015,"name":"Safe Blog","slug":"safe-blog","term_group":0,"term_taxonomy_id":2015,"taxonomy":"category","description":"","parent":0,"count":149,"filter":"raw","cat_ID":2015,"category_count":149,"category_description":"","cat_name":"Safe Blog","category_nicename":"safe-blog","category_parent":0}],"tags":[{"term_id":1103,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":1103,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":485,"name":"Cyberstalking","slug":"cyberstalking","term_group":0,"term_taxonomy_id":485,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":290,"name":"Stalking","slug":"stalking","term_group":0,"term_taxonomy_id":290,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":1531,"name":"tech abuse","slug":"tech-abuse","term_group":0,"term_taxonomy_id":1531,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":1371,"name":"Tech Safety","slug":"tech-safety","term_group":0,"term_taxonomy_id":1371,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":1101,"name":"Technology","slug":"technology","term_group":0,"term_taxonomy_id":1101,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":635,"name":"technology-facilitated stalking","slug":"technology-facilitated-stalking","term_group":0,"term_taxonomy_id":635,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"}],"issue":[{"term_id":19,"name":"Stalking","slug":"stalking","term_group":0,"term_taxonomy_id":19,"taxonomy":"issue","description":"Survivors of stalking are provided with a place to discuss their safety options, counseling, as well as advocacy with the police and courts.","parent":0,"count":94,"filter":"raw","acf":{"color":"#F9C300"}},{"term_id":21,"name":"Victims of Other Abuse","slug":"victims-of-other-abuse","term_group":0,"term_taxonomy_id":21,"taxonomy":"issue","description":"We help victims of all types of crime and abuse including: robbery, assault, harassment, elder abuse, gang violence, community violence, and families affected by homicide move from crisis to confidence.","parent":0,"count":253,"filter":"raw","acf":{"color":"#868B1A"}}]},"_links":{"self":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts\/8305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/comments?post=8305"}],"version-history":[{"count":0,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts\/8305\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/media\/8307"}],"wp:attachment":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/media?parent=8305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/categories?post=8305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/tags?post=8305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}