English

Subscribe to our newsletter

1101 Connecticut Ave, Suite 450, Washington DC 20036.

© 2024

Copyright. Stay Safe Online — NCA. All Rights Reserved.

English

Subscribe to our newsletter

1101 Connecticut Ave, Suite 450, Washington DC 20036.

© 2024

Copyright. Stay Safe Online — NCA. All Rights Reserved.

English

Subscribe to our newsletter

1101 Connecticut Ave, Suite 450, Washington DC 20036.

© 2024

Copyright. Stay Safe Online — NCA. All Rights Reserved.

Loading the Elevenlabs Text to Speech AudioNative Player...

Cybersecurity for Business

Oct 13, 2017

|

6

6

6

Min Read

What Happens When Cyberbullies Join the Workforce?

Cyberbullying has been stereotyped in the media as a problem that occurs with teenagers, cell phones, sexualized photographs and social media.

What Happens When Cyberbullies Join the Workforce?
What Happens When Cyberbullies Join the Workforce?
What Happens When Cyberbullies Join the Workforce?

What happens when cyberbullies graduate and join the workforce? How has the popularity of social media, instant messaging and online forums changed the face of bullying in the professional environment?

Bullying at work is not a new concept. As reported by Forbes, “96% of survey respondents indicated they’d been bullied in the workplace, 62% of bullying came in the form of sabotaging work and/or reputation; 52% in ‘browbeating, threats and intimidation’, and 4% in actual physical assault. And we’re not even talking about sexual harassment in the workplace.”

Bosses forcing subordinates to get coffee, staff leaving coworkers out of the watercooler talk and general office gossip are as old as time. What’s new is that work bullies can now use apps like Burnbook to leverage their damage. In almost every situation, the bully’s intent is to confuse and embarrass the victim.

How Does Cyberbullying at Work Typically Occur?

Email bullying:

These types of threats can come from anyone – a manager, a peer or even a subordinate – and may not always be seen as bullying because of how common email is. A bully may use threats – like being fired if you don’t do something or “telling” on someone for being late to work. They may use language that is patronizing or condemnatory, clog someone’s inbox with spam, tell the person to do non-work-related task or copy all of management letting them know how much you screwed up.

  • Real world example: when Clare started a new job at a PR firm in London and her colleagues would be emailing or texting each other while in the same room as her – and then laughing or smirking about the contents. One of the emails was “accidentally” sent to her, and it included insults about her. Also, they would purposely delete her name from email distribution lists and then ask her to follow up on something she didn’t know anything about.

Social media bullying:

Similar to high school students who use social media to bully, bullies at work intend to humiliate another employee by posting embarrassing messages that are seen by a large group of coworkers. Social media bullying could also be purposely excluding a coworker from a social media group discussion, posting passive-aggressive comments about specific projects or departments or even sarcastic mentions and hashtags that offend or embarrass someone.

  • Real world example: In a California case, an employer was held liable when an employee created a blog while off duty at their personal computer. The employee posted derogatory comments about a disabled coworker, called him “the Rat” and even promised money to anyone who obtained and posted photos of the person. The victim informed superiors multiple times, but they didn’t do anything to stop it.

Text message bullying:

Cell phone bullying has grown because bullies can now send threats, often on personal phones, that are not trackable by employers. It is common to share cell phone numbers in the workplace, and it is very simple for a bully to send automated or anonymized text messages using apps designed for just this purpose. Hostile late-night texts or sexual solicitations may also occur via text message.

  • Real world example: When a nurse received the text, “You should know better,” from 20 unknown numbers at exactly the same time. It turns out that she was new to her job and her subordinates didn’t like that she got the role.

What Type of Cyberbullying Is Most Common in the Workplace?

Impersonation:

When an employee poses as someone else (a boss, another employee, a leader or even a personal friend) and posts comments or sends emails or texts to confuse them, gain work-related or personal secrets or embarrass them.

Outing:

When the bully shares secrets or other personal information about their victim with a large group of employees. These secrets could be work related, such as the victim is looking to apply for another job within the company or they were assigned to a big project. The secrets could also be personal.

Trolling:

Posting mean or destructive comments on social media posts, sometimes that aren’t related to the original post at all. This may occur on public sites like Twitter, Facebook or LinkedIn but may also be on internal social media pages.

How Can You Help Prevent Cyberbullying From Happening?

Report it:

If you are a witness to bullying, of any sort, the first thing to do is to report it to a manager, human resources or another official.

Respond and support:

Keep in mind that many employees won’t immediately use the term “bullying” in referring to the treatment they are receiving from a coworker or manager. Complaints about bullying may be hidden under general work complaints. Be proactive when discussing these types of situations and listen carefully to the employee, take the situation seriously and react and report it quickly.

Policies and training:

Employees need clear policies about what is acceptable and unacceptable behavior, and all employees should be trained on how to recognize and respond to bullying. If your organization does not have these, talk to your manager and human resource organization.

Practice social media hygiene:

Stay up to date with privacy settings on all of your social media accounts, do not give out your email or phone number to people you don’t know, don’t accept friend requests from strangers and don’t send inappropriate photos, videos, emails or texts to anyone – especially coworkers (even if they are your friend or significant other today).

Call the police:

In extreme situations, if someone is in physical danger, or if management or human resources are not able to adequately resolve the situation, the police may need to get involved. Some states even have laws against workplace bullying.

Have you ever been cyberbullied at work? Have you ever known someone who has? For more information about cyberbullying, refer to the resources provided on the Cyberbullying Research Center or the National Workplace Bullying Coalition.

References:

http://www.longhaul.com.au/page/Examples_of_Cyber_Bullying_in_the_Workplace.html

About the Author

Kim Albarella is the senior director of security marketing and educational programming within ADP’s Global Security Organization. She is responsible for cyber and physical security marketing and sales support, public relations, associate security awareness, educational programming and internal and external security communications. Her previous roles at ADP, where she has been working for six years, include executive in training in the internal audit department, director of risk strategy and director of global operations and compliance internal audit. Prior to joining ADP, Kim performed audit, risk and compliance functions at Morgan Stanley and Ernst & Young. She holds multiple certifications, including certified internal auditor and certified risk management associate. Kim is currently pursuing a graduate degree in business communications from Harvard University and has a bachelor’s degree in finance and marketing from the College of New Jersey.

Featured Articles

How to Make Cybersecurity Training Accessible

How to Make Cybersecurity Training Accessible

Does your training program reach all employees in your organization?

How to Make Cybersecurity Training Accessible

How to Make Cybersecurity Training Accessible

Does your training program reach all employees in your organization?

How to Make Cybersecurity Training Accessible

How to Make Cybersecurity Training Accessible

Does your training program reach all employees in your organization?

 Facebook Hacked

What to Do if Your Business Facebook Is Hacked

There has been an uptick in cybercriminals attempting to target small businesses' Facebook profiles and ad accounts.

 Facebook Hacked

What to Do if Your Business Facebook Is Hacked

There has been an uptick in cybercriminals attempting to target small businesses' Facebook profiles and ad accounts.

 Facebook Hacked

What to Do if Your Business Facebook Is Hacked

There has been an uptick in cybercriminals attempting to target small businesses' Facebook profiles and ad accounts.

Tags

Business