Firewalling: Protecting Yourself from Electronic and Technology Abuse
- Soul Adapted

- Sep 5, 2024
- 4 min read
In today’s digital age, technology has become an integral part of our lives, connecting us with others, providing information, and offering convenience. However, for victims of abuse, technology can also be a tool of control and manipulation. Abusers may use electronic devices, social media, and other digital platforms to stalk, harass, or monitor their victims, creating an environment of fear and insecurity. This form of abuse, often referred to as electronic or technology abuse, can be just as harmful as physical or emotional abuse. To combat this, it’s essential to practice "firewalling" — a term borrowed from cybersecurity, which in this context means protecting yourself from electronic and technology abuse.

Understanding Electronic and Technology Abuse
Electronic and technology abuse involves the use of digital tools to exert control, monitor, or harm another person. This can include:
Spyware and Tracking Software: Abusers may install spyware or tracking apps on your devices to monitor your location, read your messages, or listen to your conversations without your knowledge.
Social Media Surveillance: Abusers might use social media to keep tabs on your activities, friends, and communications, sometimes even creating fake profiles to gain access to your private information.
Harassment via Text or Email: Constantly sending threatening or manipulative messages through text or email is another common tactic of technology abuse.
Controlling Online Accounts: Abusers may try to control your access to online accounts, including social media, email, or banking, to isolate you or manage your finances.
Using Technology to Isolate: An abuser might restrict your access to technology or monitor your interactions, making you feel cut off from your support network.
How to Protect Yourself: Firewalling Strategies
Just as a firewall protects your computer from external threats, firewalling yourself from technology abuse involves taking steps to secure your devices, online accounts, and digital presence. Here are some strategies to help you protect yourself:
1. Secure Your Devices

Change Passwords Regularly: Use strong, unique passwords for all your devices and accounts. Consider using a password manager to keep track of them securely.
Enable Two-Factor Authentication (2FA): 2FA adds an extra layer of security by requiring a second form of identification in addition to your password. This makes it harder for someone to access your accounts without your permission.
Install Anti-Spyware Software: Regularly scan your devices for spyware or tracking software. If you suspect your device has been compromised, consider resetting it to factory settings or seeking professional help.
Keep Software Updated: Ensure that your devices’ operating systems and apps are up to date. Software updates often include security patches that protect against the latest threats.
2. Protect Your Online Presence

Review Privacy Settings: Regularly check and update the privacy settings on your social media accounts to control who can see your posts, send you messages, or access your personal information.
Be Cautious of What You Share: Avoid sharing sensitive information online, such as your location, plans, or financial details. Be mindful of the information you post, as it could be used by an abuser to track or manipulate you.
Use Encrypted Messaging Apps: Consider using messaging apps that offer end-to-end encryption, such as Signal or WhatsApp. These apps ensure that your messages are only readable by you and the person you’re communicating with.
Create Separate Accounts: If you suspect your abuser has access to your online accounts, consider creating new accounts with different usernames and passwords for secure communication and online activity.
3. Stay Vigilant

Check for Unusual Activity: Regularly review your devices and accounts for any suspicious activity, such as unfamiliar apps, settings changes, or unusual login attempts.
Limit Location Sharing: Be mindful of apps that track your location, and disable location services when they’re not needed. Avoid sharing your location with others unless necessary.
Log Out of Devices: Always log out of shared devices, such as computers or tablets, especially if they could be accessed by someone you don’t trust.
Use Incognito Mode or VPN: When browsing the internet, consider using incognito mode or a virtual private network (VPN) to protect your online activity from being tracked.
Resources for Victims of Technology Abuse
If you’re experiencing technology abuse, it’s essential to reach out for help. There are several resources available to support you:
The National Domestic Violence Hotline (1-800-799-7233): This hotline offers confidential support and resources for those experiencing domestic violence, including technology abuse.
The National Network to End Domestic Violence (NNEDV): NNEDV provides resources and information on how to protect yourself from technology abuse, including safety planning and privacy tips.
Cyber Civil Rights Initiative (CCRI): CCRI offers support for victims of cyberstalking, revenge porn, and other forms of online abuse. They also provide resources for legal assistance and emotional support.
Privacy Rights Clearinghouse: This organization offers information on protecting your privacy and security online, including tips for avoiding surveillance and tracking.
WomensLaw.org: This site provides legal information and resources for victims of domestic violence, including how to protect yourself from technology abuse.
Moving Forward: You Deserve Safety and Privacy
Dealing with technology abuse can be overwhelming, but by taking proactive steps to protect your digital presence, you can reclaim your privacy and sense of security. Remember, you have the right to live free from surveillance, control, and harassment. Firewalling isn’t just about securing your devices; it’s about securing your peace of mind and taking control of your life.
If you’re currently in an abusive situation, reach out to trusted friends, family, or professionals for support. You don’t have to face this alone, and help is available. By understanding the tactics of technology abuse and implementing firewalling strategies, you can protect yourself and begin the journey toward healing and empowerment.









Comments