SlideShare a Scribd company logo
© 2016 Quick Heal Technologies Ltd.
WEBINAR
6 Tips to ProtectYour
Kids from
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Did You Know?
India ranks 3rd on
Global
Cyberbullying
List.[1]
[1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/
[2] Image credit: dailyparent.com
[2]
© 2016 Quick Heal Technologies Ltd.
Topics of
DISCUSSION
© 2016 Quick Heal Technologies Ltd.
What is
cyberbullying?
#1.
© 2016 Quick Heal Technologies Ltd.
Effects of
cyberbullying
#2.
© 2016 Quick Heal Technologies Ltd.
Tips for parents to
protect their kids
from cyberbullying
#3.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
#4.
© 2016 Quick Heal Technologies Ltd.
What is
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Definition:
Cyberbullying is defined as “the use of
electronic communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.”
© 2016 Quick Heal Technologies Ltd.
In other words,
cyberbullying can be…
© 2016 Quick Heal Technologies Ltd.
Harassment
Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html
- involves the bully sending offensive and
malicious messages.
© 2016 Quick Heal Technologies Ltd.
Flaming
Image credit: http://www.lifo.gr/now/society/76070
- bullying the victim in front of others by using
harsh languages.
© 2016 Quick Heal Technologies Ltd.
Exclusion
Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/
- leaving out someone from a group.
© 2016 Quick Heal Technologies Ltd.
Masquerading
- harassing the victim by using a fake identity.
© 2016 Quick Heal Technologies Ltd.
Effects of
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can have many negative implications on
the victim. It not only affects the academic career of
children but also adversely impacts their physical,
social, and mental well-being.
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can cause…
© 2016 Quick Heal Technologies Ltd.
Low self-esteem
Withdrawal from family and
friends
Depression,
Anger,
Feeling of loneliness…
Drop in grades and
performance Use of
drugs
© 2016 Quick Heal Technologies Ltd.
What Can Parents do to protect
their kids from
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Get ‘INVOLVED’
TIP #1.
in what your kids do on the Internet.
© 2016 Quick Heal Technologies Ltd.
LISTEN
TIP #2.
to their distress signals.
© 2016 Quick Heal Technologies Ltd.
TIP #3.
Don’t BLAME
them for other’s behavior.
© 2016 Quick Heal Technologies Ltd.
EDUCATE
What is Cyberbullying?
Why is it dangerous?
What can be done?
TIP #4.
them about cyberbullying.
© 2016 Quick Heal Technologies Ltd.
TIP #5.
ENCOURAGE
them to find better and safer things to indulge in.
© 2016 Quick Heal Technologies Ltd.
TIP #6.
Collect EVIDENCE
against the bully.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
© 2016 Quick Heal Technologies Ltd.
Quick Heal has always taken a strong stance against
cyberbullying. Its Parental Control feature is one of the
simple ways with which parents can ensure that their
kids use the Internet constructively without getting
exposed to any of its dangers like cyberbullying or
getting connected to dangerous people.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block inappropriate website
categories such as chat, social
media, dating, violence, adult, etc.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block specific sites which you may
feel are not right for your children.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Schedule fixed days and timings
when your kids can access the
Internet at home.
© 2016 Quick Heal Technologies Ltd.
We also have a Facebook page where we share
useful tips and updates about computer security
and especially Internet Safety for kids and
teenagers. It can be visited at:
http://bit.ly/QHSafe
© 2016 Quick Heal Technologies Ltd.
Write to us at
CorporateCommunications@quickheal.co.in
Follow us on
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2016 Quick Heal Technologies Ltd.
Content sources:
https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying
http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html
http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm
www.endcyberbullying.org/5-different-types-of-cyberbullying/
Thank You.

More Related Content

What's hot

Social Media for Women Safety
Social Media for Women SafetySocial Media for Women Safety
Social Media for Women Safety
Amit Panchal
 
Cyber crimes
Cyber crimesCyber crimes
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
Umasree Raghunath
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
Microsoft
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
SrajalTiwari1
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Shruti Bansal
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Trabajo - fake news
Trabajo - fake newsTrabajo - fake news
Trabajo - fake news
Mónica Cuéllar
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
Aman Kumar
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 

What's hot (14)

Social Media for Women Safety
Social Media for Women SafetySocial Media for Women Safety
Social Media for Women Safety
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet security
Internet securityInternet security
Internet security
 
Trabajo - fake news
Trabajo - fake newsTrabajo - fake news
Trabajo - fake news
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 

Viewers also liked

7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone
Quick Heal Technologies Ltd.
 
Cyberbullying Terms
Cyberbullying TermsCyberbullying Terms
Cyberbullying Terms
serdia
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Digital citizenship cyberbullying day one dec 2013
Digital citizenship cyberbullying day one dec 2013Digital citizenship cyberbullying day one dec 2013
Digital citizenship cyberbullying day one dec 2013
Horry County Schools
 
Local+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceLocal+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conference
Conscious Solutions
 
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and CyberbullyingFairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
Quick Heal Technologies Ltd.
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
Quick Heal Technologies Ltd.
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
Quick Heal Technologies Ltd.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
Quick Heal Technologies Ltd.
 

Viewers also liked (13)

7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone
 
Cyberbullying Terms
Cyberbullying TermsCyberbullying Terms
Cyberbullying Terms
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital citizenship cyberbullying day one dec 2013
Digital citizenship cyberbullying day one dec 2013Digital citizenship cyberbullying day one dec 2013
Digital citizenship cyberbullying day one dec 2013
 
Mc3053
Mc3053Mc3053
Mc3053
 
Local+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceLocal+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conference
 
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and CyberbullyingFairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 

Similar to 6 Tips to Protect Your Kids from Cyberbullying

INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
MAHIRA
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
Quick Heal Technologies Ltd.
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
Dr Raghu Khimani
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
MindMake - Parenting & Education
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
Quick Heal Technologies Ltd.
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
Boston Global Forum
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
Alexander Larsen
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdf
suerinz9603
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Inas Hafi
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
Anwar Jesus Esperida
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
LineshiDharamraj1
 
Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social media
Marina London
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
blondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
BHANU281672
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
briancrawford30935
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India
 

Similar to 6 Tips to Protect Your Kids from Cyberbullying (20)

INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdf
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social media
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
1st annual-social-media-risk-index
1st annual-social-media-risk-index1st annual-social-media-risk-index
1st annual-social-media-risk-index
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 

More from Quick Heal Technologies Ltd.

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
Quick Heal Technologies Ltd.
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Quick Heal Technologies Ltd.
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
Quick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Quick Heal Technologies Ltd.
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
Quick Heal Technologies Ltd.
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
Quick Heal Technologies Ltd.
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
Quick Heal Technologies Ltd.
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
Quick Heal Technologies Ltd.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
Quick Heal Technologies Ltd.
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
Quick Heal Technologies Ltd.
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
Quick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 

Recently uploaded

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 

Recently uploaded (20)

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 

6 Tips to Protect Your Kids from Cyberbullying

  • 1. © 2016 Quick Heal Technologies Ltd. WEBINAR 6 Tips to ProtectYour Kids from Cyberbullying
  • 2. © 2016 Quick Heal Technologies Ltd. Did You Know? India ranks 3rd on Global Cyberbullying List.[1] [1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/ [2] Image credit: dailyparent.com [2]
  • 3. © 2016 Quick Heal Technologies Ltd. Topics of DISCUSSION
  • 4. © 2016 Quick Heal Technologies Ltd. What is cyberbullying? #1.
  • 5. © 2016 Quick Heal Technologies Ltd. Effects of cyberbullying #2.
  • 6. © 2016 Quick Heal Technologies Ltd. Tips for parents to protect their kids from cyberbullying #3.
  • 7. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps #4.
  • 8. © 2016 Quick Heal Technologies Ltd. What is Cyberbullying?
  • 9. © 2016 Quick Heal Technologies Ltd. Definition: Cyberbullying is defined as “the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.”
  • 10. © 2016 Quick Heal Technologies Ltd. In other words, cyberbullying can be…
  • 11. © 2016 Quick Heal Technologies Ltd. Harassment Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html - involves the bully sending offensive and malicious messages.
  • 12. © 2016 Quick Heal Technologies Ltd. Flaming Image credit: http://www.lifo.gr/now/society/76070 - bullying the victim in front of others by using harsh languages.
  • 13. © 2016 Quick Heal Technologies Ltd. Exclusion Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/ - leaving out someone from a group.
  • 14. © 2016 Quick Heal Technologies Ltd. Masquerading - harassing the victim by using a fake identity.
  • 15. © 2016 Quick Heal Technologies Ltd. Effects of Cyberbullying
  • 16. © 2016 Quick Heal Technologies Ltd. Cyberbullying can have many negative implications on the victim. It not only affects the academic career of children but also adversely impacts their physical, social, and mental well-being.
  • 17. © 2016 Quick Heal Technologies Ltd. Cyberbullying can cause…
  • 18. © 2016 Quick Heal Technologies Ltd. Low self-esteem Withdrawal from family and friends Depression, Anger, Feeling of loneliness… Drop in grades and performance Use of drugs
  • 19. © 2016 Quick Heal Technologies Ltd. What Can Parents do to protect their kids from Cyberbullying?
  • 20. © 2016 Quick Heal Technologies Ltd. Get ‘INVOLVED’ TIP #1. in what your kids do on the Internet.
  • 21. © 2016 Quick Heal Technologies Ltd. LISTEN TIP #2. to their distress signals.
  • 22. © 2016 Quick Heal Technologies Ltd. TIP #3. Don’t BLAME them for other’s behavior.
  • 23. © 2016 Quick Heal Technologies Ltd. EDUCATE What is Cyberbullying? Why is it dangerous? What can be done? TIP #4. them about cyberbullying.
  • 24. © 2016 Quick Heal Technologies Ltd. TIP #5. ENCOURAGE them to find better and safer things to indulge in.
  • 25. © 2016 Quick Heal Technologies Ltd. TIP #6. Collect EVIDENCE against the bully.
  • 26. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps
  • 27. © 2016 Quick Heal Technologies Ltd. Quick Heal has always taken a strong stance against cyberbullying. Its Parental Control feature is one of the simple ways with which parents can ensure that their kids use the Internet constructively without getting exposed to any of its dangers like cyberbullying or getting connected to dangerous people.
  • 28. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block inappropriate website categories such as chat, social media, dating, violence, adult, etc.
  • 29. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block specific sites which you may feel are not right for your children.
  • 30. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Schedule fixed days and timings when your kids can access the Internet at home.
  • 31. © 2016 Quick Heal Technologies Ltd. We also have a Facebook page where we share useful tips and updates about computer security and especially Internet Safety for kids and teenagers. It can be visited at: http://bit.ly/QHSafe
  • 32. © 2016 Quick Heal Technologies Ltd. Write to us at CorporateCommunications@quickheal.co.in Follow us on Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 33. © 2016 Quick Heal Technologies Ltd. Content sources: https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm www.endcyberbullying.org/5-different-types-of-cyberbullying/ Thank You.

Editor's Notes

  1. Harassment involves the bully sending offensive and malicious messages to an individual or a group and is often repeated multiple times. Cyberstalking is one form of harassment that involves continual threatening and rude messages, and can lead to physical harassment in the real, offline world.
  2. Flaming is similar to harassment, but it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.
  3. Exclusion is the act of intentionally singling out and leaving a person out from an online group such as chats and sites. The group then subsequently leave malicious comments and harass the one they singled out.
  4. Masquerading is a situation where a bully creates a fake identity to harass someone anonymously. In addition to creating a fake identity, the bully can impersonate someone else to send malicious messages to the victim.
  5. The effects of cyberbullying may not be noticeable at first, but the stress factor builds up over time. Many students experiencing cyber bullying feel alone and scared. In most instances, cyber bullying doesn’t start online, but in person. The situation then escalates. Some of the signs of cyber bullying could be: Not wanting to go to school A sharp drop in grades and performance Skipping school Sudden self-esteem issues Complaints of illnesses Use of alcohol or drugs Reluctance to let parents or other family members anywhere near their mobiles, laptops etc Friends disappearing or being excluded from social events Losing weight or changing appearance to try and fit in Fresh marks on the skin that could indicate self-harm and dressing differently such as wearing long sleeved clothes in the summer to hide any marks
  6. By Getting involved we mean join your kids in what they do in their world. Become their companion. One of the best ways to understand what your kids are doing online is to do it, too. Create a Facebook page and add your kids as "friends." It's no different than expecting to meet your kids friends and dates. You'll be able to see what your kids are posting and what type of response they may be getting. Besides, you might have fun as well.
  7. Half of any worldly problem can be solved only by listening about it. Children are made to let out signals when they are in distress. They may withdraw from family and friends, become increasingly angry, moody and sullen or start acting out. And, yes, this is normal teen behavior! Even so, these are all cries for help. It is important that parents pay attention to these signals as they arise because they may be signs that something bigger is going on. Speak to them, ask them what’s troubling them.
  8. Wounding a wounded never helps. Never blame your child for other’s behavior, regardless of how the situation originated. It is vital that your child feels safe at home from these attacks. Make it clear to your child that everything that is happening has to do with the bully’s issues, not with theirs. Try to make this attacks a positive experience for your relationship with your children. 
  9. You cannot fight an enemy without learning about them. Make sure your kids understand what cyberbullying is and why it’s dangerous. Ask them what they would do if they found themselves on the receiving end, and encourage them to think about how the victims might feel. Have your kids name some adults they could turn to for help and let them know that it’s OK if they don’t feel comfortable coming directly to you. The important thing is that they find someone who can support them and get any help they may need.
  10. Help your kids find safe things to do online and positive ways to express their identity and creativity. Rather than engaging in social networking sites, some kids might like designing video games, composing music, exploring digital photography or creating digital art. In additional, encourage them to take on activities offline, such as clubs, church groups and sports. Remember that the draw of chats and social networking is the ability to connect with other people, so help them find positive ways to make the same connections.
  11. Unfortunately, many bullying cases start small and then become worse over time. It is important that you keep records of all offending content (messages, videos, images, etc.) in case the abuse becomes worse and you want authorities to get involved. When malicious behavior is demonstrated with evidence, it is easier for authorities to respond.