Mytek Logo
MyTek Logo

Cyberbullying is a Serious Issue Everywhere

by | Jun 28, 2018 | Miscellaneous, MyTek Blog


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

As technology changes, our use of it changes with it. There have been so many great developments in our lives based on technology, it has also made it way easier to torment, harass and be mean to one another. This is a huge issue that is constantly growing and we need to know how to take charge of this — at home and in the workplace.

On June 17th, 2012, The Cybersmile Foundation was formed in order to spread awareness about online harassment and encourage inclusivity instead of abuse and toxicity. Their efforts are very needed, even now, because cyberbullying is still a big issue.

What is a Cyberbully?

A cyberbully is exactly what it sounds like it would be: A bully who takes advantage of the internet setting to bully, harass, torment, and hurt people online. This can be done through instant messaging, online forums, social media, and other online platforms. Cyberbullies aren’t always even one single person and they can also work anonymously which makes it hard to hold them accountable. 

Cyberbullying can also be private so people are getting bullied and talked about without their knowledge, and may never know unless someone tells them.

Cyberbullying In The Workplace

While cyberbullying can sound like something that only happens to children, it can happen to just about anyone. In a digital workplace, with tools used like social media, instant messaging and email, cyberbullies can arise. In a survey done on 3,000 people, it was found that 96 percent of them had been bullied in the workplace.

Whether this is workplace gossip between coworkers or a manager sending abusive emails or messages, hostile work environments can be negatively affected by cyberbullying.

What Can Be Done

Employees and employers can take steps to prevent and discourage cyberbullying from taking place in their work environment. A recipient of cyberbullying should not keep quiet about this situation but should stay calm as they stand up for themselves and bring the situation to light. Taking the high road and calmly discussing the issue is an asset when it comes to issues of virtual harassment. If you’re being harassed, collect the evidence and get support from a higher-up by lodging a formal complaint. These emails, posts, or other instances will help expose their toxic behavior. You should also be aware of your rights, especially when it comes to data protection and defamation that your cyberbully could get in serious trouble for.

An employer should always work on making the environment as calming and hospitable as ever. Harassment and cyberbullying should never be taken lately and it should always be a very important issue if it ever arises. There should be a policy prepared so there is a specific protocol to use and this policy should be introduced when training new employees and staff.

For more info on cyberbullying in the workplace, visit the Stop Cyberbullying Day website. Technology should be used in positive ways to provide us more opportunities and should not be used as a weapon against each other.


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This