{"id":42519,"date":"2021-08-25T16:00:12","date_gmt":"2021-08-25T16:00:12","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=96051"},"modified":"2021-08-25T16:00:12","modified_gmt":"2021-08-25T16:00:12","slug":"cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/","title":{"rendered":"Cybersecurity\u2019s next fight: How to protect employees from online harassment"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/M365CO19_SMB_iPhone_210.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><em class=\"x-hidden-focus\">The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/nataliagodyla\/\" target=\"_blank\" rel=\"noopener\">Natalia Godyla<\/a>&nbsp;talks with <\/em><a href=\"https:\/\/www.linkedin.com\/in\/hypatia\" target=\"_blank\" rel=\"noopener\"><em>Leigh Honeywell<\/em><\/a><em>, CEO and Co-founder of Tall Poppy, which builds tools and services to help companies protect their employees from online harassment and abuse. In this blog, Leigh talks about company strategies for fighting online harassment.<\/em><\/p>\n<p><strong>Natalia: What are some examples of online harassment experienced in the workplace?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> Online harassment breaks down into two types. The first is harassment related to your job. One example of this would be that an ex-employee has a conflict with the company and is harassing former colleagues. In other cases, it has to do with a policy decision or a moderation decision that the company made, resulting in people within the organization experiencing harassment.<\/p>\n<p>The other type of harassment has nothing to do with somebody\u2019s day job. For instance, an employee had a bad breakup and their ex is bothering them at work. It\u2019s not strictly related to the employee\u2019s day-to-day work, but it\u2019s going to impact their ability to be present at work and participate in work life. Many folks who are dealing with harassment\u2014whether related to work or not\u2014experience lost productivity, attrition, and burnout.<\/p>\n<blockquote>\n<p>Discover how <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/communication-compliance?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">communication compliance<\/a> in <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\" target=\"_blank\" rel=\"noopener\">Microsoft 365<\/a> can help you detect harassing or threatening language and take action to protect your employees.<\/p>\n<\/blockquote>\n<p><strong>Natalia: How widespread of a problem is online harassment?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> Online harassment is a significant phenomenon. In 2020, 41 percent of Americans experienced it and 28 percent experienced the more severe kinds, like threats of violence, stalking, sexual harassment, and persistent harassment, according to the Pew Online Harassment Update<sup>1<\/sup>. That\u2019s a huge number of people experiencing these issues. It has made us prioritize motivating people to improve their security hygiene around personal accounts.<\/p>\n<p>Your employees\u2019 personal accounts are part of the attack surface of the company. Social engineering attacks are when cybercriminals use psychological manipulation on their targets. If someone is being extorted based on their personal life, it has the potential to impact the company. In a classic CEO scam, somebody breaks into an executive\u2019s personal email account, emails a person in accounting posing as the executive, and asks them to send a wire transfer to a bank account controlled by the scammer.<\/p>\n<p><strong>Natalia: What are recent trends in online harassment?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> According to the most recent Pew study, online harassment went up. Project Include just published a study<sup>2<\/sup> on the internal company harassment landscape during COVID-19, and there has been a sharp uptick in workplace harassment.<\/p>\n<p>Even though the numbers are stable in terms of how many people are experiencing online harassment, before COVID-19, if you were dealing with harassment from outside the company in the course of your work, you still got to go home and have that mental separation. When people work remotely, it\u2019s a different experience, and it feels a lot more personal and vulnerable for those dealing with this kind of harassment.<\/p>\n<p><strong>Natalia: What should organizations understand about online harassment?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> It\u2019s clear under US and Canadian law that organizations have a duty to ensure that employees don\u2019t harass each other within the organization. When harassment in the workplace comes from outside the company, such as internet harassment, there isn\u2019t a ton of clarity. I think it\u2019s important to make sure that employees have clear policies and internal recourse.<\/p>\n<p>In a typical harassment scenario, an employee says something controversial on Twitter, and people try to get them fired from their company. Sometimes, the things that people say that get them fired are racist or homophobic or biased in some way. When people talk about cancel culture, they are typically talking about consequences. You say something, and you get held to that word.<\/p>\n<p>However, it\u2019s hard to arbitrate. Is the controversial statement fireable, or is it controversial because they are members of an underrepresented group and are being targeted for standing up for themselves? That\u2019s one of the lenses I use to unpack these situations.<\/p>\n<p><strong>Natalia: How can online harassment lead to hacking?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> After abuse on social channels and unwanted emails, online harassment sometimes gets more aggressive. You see password reset attempts that you have not requested. The next level is credential stuffing, where an attacker obtains a person\u2019s email and password combo from old breaches and tries the credentials on different accounts. Another potential escalation is SIM swapping, which involves the attacker impersonating the victim to a phone company and porting their phone number away to a fresh SIM card. This attack usually targets folks who are high profile and is less common in stalking situations.<\/p>\n<p><strong>Natalia: What does the incident response process look like when an employee is under attack?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> When dealing with an urgent incident in a workplace, such as somebody hacking into a printer at a branch office, there are known playbooks for responding to different attacks. Likewise, we have different playbooks based on the type of harassment situation an employee is dealing with, for example, harassment by an ex-employee or an employee being targeted due to a company policy decision.<\/p>\n<p>We also pay a lot of attention to the adversaries. We\u2019ll typically make sure the person has safe devices and ensure the adversary does not have access to their personal accounts. We\u2019ll walk them through changing relevant passwords and checking authorized applications. From there, it\u2019s about making sure that the person is OK, and that includes making sure they know about internal resources like an employee assistance program for counseling services.<\/p>\n<p><strong>Natalia: What are the best practices a company can institute to mitigate online harassment or assist those impacted by it?<\/strong><\/p>\n<p><strong>Leigh:<\/strong> First, have clear internal policies and escalation points around acceptable social media use. There are some industries where it\u2019s understandable that you don\u2019t want employees having a social media presence, but those are rare these days. In general, it\u2019s not realistic to tell employees not to exist online in public, so what\u2019s important is to make boundaries, expectations, and guardrails clear via a written social media policy. Employees want to have long-lived careers and build their personal brands\u2014trying to shut that down wholesale will end up with unfair enforcement and isn\u2019t realistic.<\/p>\n<p>The second best practice is to make sure people have tools and resources available to secure their personal lives, whether it\u2019s a hardware security key <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/12\/empower-firstline-workers-azure-ad-yubikey-passwordless-authentication\/\" target=\"_blank\" rel=\"noopener\">such as a Yubikey<\/a> or a quality password manager. All those day-to-day tools are as important in the workplace as they are in people\u2019s personal lives. Online harassment training teaches employees how to keep attackers out of their personal accounts such as email, bank accounts, and social media. It can be overwhelming trying to understand all the information available about staying safe online. And there\u2019s an argument to be made that you shouldn\u2019t have to become an expert on personal cybersecurity to be able to live your life with an internet presence in the modern world.<\/p>\n<p>The third one would be to ensure there are available resources within the organization that are clear and accessible, so it\u2019s understood where the escalation paths are\u2014whether it\u2019s providing training to management and having management communicate to frontline staff or using internal communications tools to inform employees of resources.<\/p>\n<p>Helping employees improve their personal cybersecurity can help them feel confident that their personal digital infrastructure is secure and helps ensure that online harassment isn\u2019t going to escalate to an incident like an account takeover.<\/p>\n<h2>Learn more<\/h2>\n<p>Learn how <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/communication-compliance?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">communication compliance<\/a> in <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\" target=\"_blank\" rel=\"noopener\">Microsoft 365<\/a> can help you detect harassing or threatening language and take action to foster a culture of safety.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><a href=\"https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/\" target=\"_blank\" rel=\"noopener\">The State of Online Harassment<\/a>, Emily A. Vogels, Pew Research Center, 13 January 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/projectinclude.org\/remote-work-report\/\" target=\"_blank\" rel=\"noopener\">Remote work since COVID-19 is exacerbating harm: What companies need to know and do<\/a>, Yang Hong, McKensie Mack, Ellen Pao, Caroline Sinders, Project Include, March 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/25\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tall Poppy CEO and Co-founder Leigh Honeywell talks with Microsoft about how companies can support employees who have been targeted for online harassment.<br \/>\nThe post Cybersecurity&#8217;s next fight: How to protect employees from online harassment appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42520,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,9127],"class_list":["post-42519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-voice-of-the-community"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T16:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybersecurity\u2019s next fight: How to protect employees from online harassment\",\"datePublished\":\"2021-08-25T16:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\"},\"wordCount\":1405,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg\",\"keywords\":[\"Cybersecurity\",\"Voice of the Community\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\",\"name\":\"Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg\",\"datePublished\":\"2021-08-25T16:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg\",\"width\":1200,\"height\":801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\u2019s next fight: How to protect employees from online harassment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-25T16:00:12+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybersecurity\u2019s next fight: How to protect employees from online harassment","datePublished":"2021-08-25T16:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/"},"wordCount":1405,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg","keywords":["Cybersecurity","Voice of the Community"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/","url":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/","name":"Cybersecurity\u2019s next fight: How to protect employees from online harassment 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg","datePublished":"2021-08-25T16:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment.jpg","width":1200,"height":801},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybersecuritys-next-fight-how-to-protect-employees-from-online-harassment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity\u2019s next fight: How to protect employees from online harassment"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42519"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42519\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42520"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}