Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Cohesity Launches New Partner Program to Accelerate Partner Success
Experts weight in on Singapore’s response to UNC3886
Urgent mitigation urged for on-premises users of an endpoint security ...
VIVOTEK’s VORTEX Cloud Solution Enhances Efficiency and Security...
Do corporations know the various AI risks that come with insufficient ...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Experts weight in on Singapore’s response to UNC3886

      Experts weight in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter, Tips
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      Experts weight in on Singapore’s response to UNC3886

      Experts weight in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter, Tips
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

Are support systems for victims of online harm sufficient and accessible?

By CybersecAsia editors | Wednesday, June 11, 2025, 3:20 PM Asia/Singapore

Are support systems for victims of online harm sufficient and accessible?

One advocacy group in Singapore has reviewed three years of survey trends to produce a report proposing four mitigative reforms.

In Singapore, a report released on 29 May 2025 by a non-profit organization, has asserted that survivors of online harms in the country face persistent challenges in seeking help, highlighting what its authors describe as critical gaps in existing support systems.

The report, which contains compilations of the experiences of individuals affected by cyberbullying, image-based sexual abuse, cancel campaigns, impersonation, and sexual harassment, is being circulated by its authors as evidence of the need for urgent reforms and broader public education.

According to the summary provided by the authors, survivors interviewed over three years have described a range of obstacles and negative impacts:

  • Deep psychological toll: Survivors reportedly experienced lasting mental health effects, including anxiety, panic attacks, and, in some cases, suicidal ideation.
  • Limited and unclear support options: Many participants had expressed that they found it difficult to be heard by online platforms, or were intimidated by formal legal processes, leaving them uncertain of where to turn for help.
  • Anonymity as a barrier to accountability: The report indicates that the abuse of anonymous or throwaway accounts had allowed perpetrators to evade identification, making it difficult for survivors to seek resolution.
  • Blame and normalization: Survivors in the surveys conducted had often blamed themselves, or had been blamed by others. Some had described online harms as so common that such acts were not worth reporting.

In response to these reported issues, the report is proposing several reforms in Singapore:

  1. Restore agency to survivors: Develop clear, accessible support pathways that do not require immediate escalation to police or courts
  2. Require timely and transparent platform responses: Ensure online platforms respond quickly and transparently to reports of harm
  3. Close anonymity loopholes: Introduce stronger digital identity safeguards to help identify repeat or high-risk offenders
  4. Promote a whole-of-society response: Encourage coordinated action among law enforcement, social service professionals, educators, parents, and tech platforms, supported by sustained public education to shift norms around online behavior

The organization behind the report, SG Her Empowerment (SHE), describes itself as an independent non-profit focused on gender equality and online safety. In a prepared statement, its Chairperson, lawyer Stefanie Yuen Thio, has noted that “too many survivors are still left feeling traumatized and frustrated by a lack of agency” in the country.

Share:

PreviousDid cyberattackers’ increased use of AI last year boost ransom payment rates?
NextAnd all along we thought phone numbers linked to our online identity were safe

Related Posts

Take a trip into the world of Dark Net Malware-as-a-Service sales

Take a trip into the world of Dark Net Malware-as-a-Service sales

Tuesday, June 20, 2023

Singapore launches three initiatives to tackle the new global cyber landscape

Singapore launches three initiatives to tackle the new global cyber landscape

Friday, October 21, 2022

APT group peddling fake AI-driven robotic dolls now linked to Iran

APT group peddling fake AI-driven robotic dolls now linked to Iran

Tuesday, August 23, 2022

Total malware grew 19x in the past year

Total malware grew 19x in the past year

Friday, July 24, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.