{"id":4261,"date":"2018-06-13T14:41:23","date_gmt":"2018-06-13T18:41:23","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=4261"},"modified":"2025-02-24T17:13:28","modified_gmt":"2025-02-24T17:13:28","slug":"is-your-child-being-cyberbullied-know-the-signs","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/","title":{"rendered":"Is your child being cyberbullied? Know the signs, and learn what you can do"},"content":{"rendered":"<p>We\u2019ve all heard the horror stories about cyberbullying. Online bullies, often acting anonymously, pick a target and never let up. They harass, they make threats, they spread rumors on social media.<\/p>\n<p>They make their targets feel rejected, isolated, excluded. It can lead to despair, depression and anxiety, which sometimes can contribute to suicidal behavior.<\/p>\n<p>It is hell to deal with, and too many families know this pain all too well. Many families find themselves wondering how to avoid cyberbullying.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"width: 1200px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-4261-1\" width=\"1200\" height=\"675\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/00048.mp4?_=1\" \/><a href=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/00048.mp4\">https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/00048.mp4<\/a><\/video><\/div>\n<p>&nbsp;<\/p>\n<p>How common is cyberbullying in the United States? Here are some statistics from stopbullying.gov:<\/p>\n<ul>\n<li>About 9 percent of students in grades 6 through 12 reported they had experienced cyberbullying in a National Center for Education Statistics and Bureau of Justice Statistics study.<\/li>\n<li>About 15 percent of high school students were electronically bullied within a year covered by a 2001 study.<\/li>\n<li>The numbers go way up for LGBTQ students: 55.2 percent experienced cyberbullying, according to the 2011 \u201cNational School Climate Survey: The experiences of lesbian, gay, bisexual and transgender youth in our nation\u2019s schools.\u201d<\/li>\n<\/ul>\n<p>At <a href=\"https:\/\/www.digitalforensics.com\">Digital Forensics Corp.<\/a>, we\u2019ve helped clients identify anonymous online bullies, document the <a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-report-cyber-harassment\/\" target=\"_blank\" rel=\"noopener\">cyber harassment<\/a> and win restraining orders. Some cases can even lead to criminal charges. We\u2019ve heard the anguish from parents, teens and children dealing with online bullies, and want to do our part to help.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"How_can_you_tell_if_your_child_is_being_bullied_online\"><\/span><strong>How can you tell if your child is being bullied online?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>One obstacle to finding solutions to cyberbullying is the silence of the victims. Y<a href=\"https:\/\/cyberbullying.org\/students-experiences-with-reporting-cyberbullying\">oung people sometimes do not want to talk about the situation<\/a>, even with a parent or other trusted person. Maybe they are embarrassed. Maybe they are afraid. Maybe they have some other reason, but they often do not want to talk about what is going on, and parents sometimes do not know their child is a victim or know the extent of the bullying.<\/p>\n<p>Even when children or teens don\u2019t want to talk, however, there are some signs that they might be victims of online bullying, or might be bullying others:<\/p>\n<ul>\n<li><strong>Noticeable, sudden increases or decreases in the amount of time spent online.<\/strong> Your son or daughter may be avoiding online activity for fear of seeing more harassment or checking online more frequently to see if harassment has continued.<\/li>\n<li><strong>Emotional responses to what a child sees online.<\/strong> Laughter, anger or sadness in reaction to online activity could be a sign that harassment is occurring.<\/li>\n<li><strong>A child hides the phone, or the screen, when someone comes near:<\/strong> If your son or daughter does not want you to see what\u2019s going on online, it might indicate bullying.<\/li>\n<li><strong>Social media accounts are suddenly shut down, or new ones appear:<\/strong> Victims of bullying sometimes delete social media accounts in an attempt to escape harassment, and open new ones. Bullies often set up anonymous accounts to use for harassment. They have been known to delete them suddenly if they are concerned about getting caught.<\/li>\n<\/ul>\n<p>You can find more tips at <a href=\"https:\/\/www.stopbullying.gov\/\">StopCyberbullying.gov<\/a> and <a href=\"https:\/\/cyberbullying.org\">Cyberbullying.org.<\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"What_can_you_do_about_online_bullying\"><\/span><strong>What can you do about online bullying?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The dangers of cyberbullying will never go away entirely, but there are steps you can take to cope, or maybe even stop it, if it is happening to you.<\/p>\n<ul>\n<li><strong>Get help:<\/strong> There are several resources at StopBullying.gov, including links to help you find mental health counseling, the National Suicide Prevention Lifeline at 1-800-273-TALK (8255) and tips for how you can persuade schools to take bullying seriously.<\/li>\n<li><strong>Respond quickly: <\/strong>Sometimes one or two harassing incidents a month suddenly escalate to dozens or more a day. Don\u2019t assume it will go away on its own. Grab screen images of the harassment, along with all the information about the account involved that you can, before that evidence disappears.<\/li>\n<li><strong>Take action:<\/strong> A private digital investigation can help collect the evidence, identify the IP address used by a bully, and give you the means to <a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/\">stop harassment legally<\/a> by filing a complaint and subpoenaing the bully\u2019s internet service provider. A restraining order or criminal charges may be possible, depending on the jurisdiction and the severity of the harassment. Digital Forensics Corp., 1-800-849-6515, has helped many people deal with cyberbullies.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"We\u2019ve all heard the horror stories about cyberbullying. Online bullies, often acting anonymously, pick a target and never&hellip;","protected":false},"author":126,"featured_media":4262,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[12],"tags":[],"class_list":{"0":"post-4261","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Can You Do When Your Child Is Being Cyberbullied.<\/title>\n<meta name=\"description\" content=\"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment\" \/>\n<meta name=\"robots\" content=\"index, nofollow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is your child being cyberbullied? Know the signs, and learn what you can do\" \/>\n<meta property=\"og:description\" content=\"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-13T18:41:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T17:13:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3200\" \/>\n\t<meta property=\"og:image:height\" content=\"2133\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Is your child being cyberbullied? Know the signs, and learn what you can do\",\"datePublished\":\"2018-06-13T18:41:23+00:00\",\"dateModified\":\"2025-02-24T17:13:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/DSC09407-scaled.jpg\",\"articleSection\":[\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/\",\"name\":\"What Can You Do When Your Child Is Being Cyberbullied.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/DSC09407-scaled.jpg\",\"datePublished\":\"2018-06-13T18:41:23+00:00\",\"dateModified\":\"2025-02-24T17:13:28+00:00\",\"description\":\"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/DSC09407-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/DSC09407-scaled.jpg\",\"width\":3200,\"height\":2133},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/is-your-child-being-cyberbullied-know-the-signs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is your child being cyberbullied? Know the signs, and learn what you can do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Can You Do When Your Child Is Being Cyberbullied.","description":"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment","robots":{"index":"index","follow":"nofollow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/","og_locale":"en_US","og_type":"article","og_title":"Is your child being cyberbullied? Know the signs, and learn what you can do","og_description":"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment","og_url":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2018-06-13T18:41:23+00:00","article_modified_time":"2025-02-24T17:13:28+00:00","og_image":[{"width":3200,"height":2133,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Is your child being cyberbullied? Know the signs, and learn what you can do","datePublished":"2018-06-13T18:41:23+00:00","dateModified":"2025-02-24T17:13:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/"},"wordCount":720,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg","articleSection":["News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/","url":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/","name":"What Can You Do When Your Child Is Being Cyberbullied.","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg","datePublished":"2018-06-13T18:41:23+00:00","dateModified":"2025-02-24T17:13:28+00:00","description":"Learn how to recognize the signs of cyberbullying and what steps you can take to protect your child. Get expert advice and resources to combat online harassment","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/DSC09407-scaled.jpg","width":3200,"height":2133},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/is-your-child-being-cyberbullied-know-the-signs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams","item":"https:\/\/www.digitalforensics.com\/blog\/news\/"},{"@type":"ListItem","position":3,"name":"Is your child being cyberbullied? Know the signs, and learn what you can do"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=4261"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4261\/revisions"}],"predecessor-version":[{"id":15419,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4261\/revisions\/15419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/4262"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=4261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=4261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=4261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}