Resource Center

Guides and Other Resources.

Programs and Tools

C.O.A.C.H: Crash Override's Automated Cybersecurity Helper. An interactive step-by-step tool that will help you protect your online life.

DIY Security Guides

Account Security 101: Passwords, Multifactor, Social Engineering, and You: Learn how to create and manage strong passwords and prevent unauthorized access to your accounts.

Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.

Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it.

So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.

Educational Materials

For Employers: A brief informational sheet to help your employer understand what's happening to you, if you're targeted by online abuse. Printable one-page version available.

Third Party Guides

Speak Up & Stay Safe(r): A Guide to Protecting Yourself From Online Harassment by Anita Sarkeesian, Jaclyn Friedman, and Renee Bracey Sherman

How To Protect Your Data And Remove Personal Information From The Internet: Abine's step by step instructions on how to remove your online public records from the leading data sites.

Nonconsensual Intimate Images Removal Guide: End Revenge Porn's list of how to report this violation on all of their platforms.

Social Media Safety Guides: HeartMob's compiled user friendly information on how to best use reporting and privacy tools on each platform.

Resources for Victims of Online Abuse: Cyber Civil Rights Initiative's own list of resources.

Tools and Services

LastPass: A program that helps you generate and store long, unique passwords without the headache. A directory of which sites will let you use two-factor authentication, and how to enable it.

JustDelete.Me: Find and delete old accounts.

Burner: Generate burner phone numbers locally on your smartphone.

TOR: Protect your privacy and location while you access the internet.

Prey: Remotely lock down your devices.