✓ One-time payment no subscription7 Packages · 38 Courses · 146 LessonsReal-world safety, wellbeing, and life skills educationFamily progress tracking included🔒 Secure checkout via Stripe✓ One-time payment no subscription7 Packages · 38 Courses · 146 LessonsReal-world safety, wellbeing, and life skills educationFamily progress tracking included🔒 Secure checkout via Stripe
Home/Blog/Digital Safety
Digital Safety9 min read · April 2026

Cyberbullying and Online Harassment of Older Adults: What It Is and How to Respond

Online harassment and cyberbullying are not limited to young people. Older adults experience harassment, intimidation, and abuse online with increasing frequency, and the impact can be significant. This guide explains what online harassment looks like, how to respond, how to protect yourself, and where to find support.

Online Harassment Is Not Only a Young Person's Problem

Public conversation about cyberbullying and online harassment tends to focus on children and teenagers, and the genuine severity of the problem for those age groups is well documented. What receives far less attention is the significant and growing experience of online harassment among older adults. As more people over 60 use social media, participate in online communities, date online, and engage in public discussion through digital channels, they encounter the same environments in which harassment, intimidation, and abuse occur.

The experience of online harassment for older adults takes several forms. It includes targeted personal abuse, often age-related or sexist in character; coordinated harassment campaigns sometimes called pile-ons; impersonation of the victim or of people they trust; sharing of private or fabricated information intended to embarrass or harm; financial extortion using real or fabricated compromising material; and persistent unwanted contact from individuals who have become fixated on a particular person.

The impact of harassment on older adults can be profound. Many older adults who experience harassment report withdrawing from online activity that they previously valued, including contact with family and friends, online communities of interest, and news engagement. Social isolation that results from harassment withdrawal carries its own significant health risks, making the harm extend well beyond the immediate distress of the harassment itself.

What Online Harassment Looks Like

Online harassment encompasses a wide range of specific behaviours. Understanding the vocabulary helps in identifying, documenting, and reporting it appropriately.

Direct abuse involves messages, comments, or posts that are insulting, threatening, or demeaning. This may be directed at you personally through private messages or by tagging you in public posts. It includes abusive emails, social media comments, and messages through any online communication channel.

Trolling involves deliberately provocative, offensive, or upsetting communications intended to cause distress and elicit a reaction. Trolls may target individuals repeatedly or spread across online communities targeting whoever responds most strongly. The advice commonly given about trolling is not to engage, as engagement often encourages further activity.

Doxxing refers to the publication of private personal information about a person without their consent, typically with the intention of exposing them to harassment from others. This can include home address, telephone number, workplace, photographs, and other information that individuals have not chosen to make public. Doxxing is particularly dangerous because it can facilitate offline as well as online harassment.

Impersonation involves creating fake accounts using another person's name, photograph, or identity to post in their name, contact people in their social network, or damage their reputation. Discovering that someone is impersonating you online can be deeply disturbing and potentially damaging to relationships and reputation.

Sextortion involves threatening to share intimate images, real or fabricated, unless the victim complies with demands, typically financial. This form of harassment is increasing across all age groups and is often perpetrated by criminal networks operating internationally. Older adults are targeted specifically by some sextortion operations, which use romance fraud approaches to obtain compromising material or simply claim to have material that does not exist.

Unwanted persistent contact, sometimes called cyberstalking, involves someone repeatedly contacting or monitoring a person online despite clear indications that the contact is unwelcome. This can escalate to surveillance of online activity, attending locations mentioned in posts, or contacting the victim's family and contacts.

Immediate Steps When Harassment Occurs

If you experience online harassment, the immediate priorities are to document what is happening, to reduce your exposure to further contact, and to assess whether the situation requires urgent action.

Document the harassment before taking any other action. This means taking screenshots of abusive messages, comments, posts, and profiles, including the profile name, username, and any identifying information visible. Date and save these records. Documentation is essential for any subsequent report to a platform, to police, or to a legal adviser, and it is important to capture it before the harasser deletes material.

Block the person responsible using whatever platform you are communicating through. Blocking prevents further direct contact and removes you from the person's ability to see your activity on that platform. The precise mechanism for blocking varies by platform but is typically accessible through the person's profile or through the message thread.

From HomeSafe Education
Learn more in our Aging Wisdom course — Older Adults 60+

Report the harassment to the platform. Every major social media platform, messaging service, and online community has a mechanism for reporting abusive behaviour, and most platforms take these reports seriously and investigate them. Use the reporting function and describe the behaviour clearly, attaching your documented evidence where the platform allows this. If the report is not acted upon adequately, you can typically escalate to a senior level of review or contact the platform's trust and safety team through alternative channels.

Consider whether you need to change any privacy settings on your online accounts. This is a good moment to review what information is publicly visible and to restrict visibility to trusted contacts rather than the general public.

When to Involve the Police

Not all online harassment is criminal, but some is. Threats of violence, sustained targeted harassment that causes significant alarm and distress, stalking behaviour, impersonation, doxxing, and sextortion all potentially cross into criminal territory under laws that vary by country.

In many countries, specific legislation exists to address online abuse and harassment. In the UK, the Protection from Harassment Act, the Malicious Communications Act, and the Online Safety Act all create criminal offences relevant to different forms of online abuse. In other countries, specific or general harassment, communications, and cybercrime legislation applies.

If you feel that your personal safety is at risk, if you have received explicit threats, if you are being stalked online and offline, or if you are the subject of a sextortion demand, report to the police rather than only to the platform. Bring your documented evidence with you. In the UK, reports can be made to your local police or through the Action Fraud reporting service for cybercrime. In the US, the FBI's Internet Crime Complaint Center accepts reports of cyberstalking and harassment.

A solicitor who specialises in online abuse or media law can advise on civil as well as criminal options where harassment has caused demonstrable harm to your reputation or caused significant psychological distress.

Managing the Emotional Impact

Online harassment can cause significant psychological distress, including anxiety, depression, sleep disturbance, and a loss of trust in online environments and in people more broadly. These are legitimate and understandable responses to an experience that, at its worst, involves being deliberately targeted by one or more people with the intent of causing harm.

Do not minimise the impact. Online harassment is not trivial because it occurs through a screen rather than in person. The harm it causes is real, and responding to it with appropriate seriousness, including seeking support, is entirely reasonable.

Talk to someone you trust about what you are experiencing. Isolation in response to harassment compounds its impact. A trusted family member, friend, or GP can provide both emotional support and practical assistance in managing the situation. Some people find that simply having another person who knows what is happening and who can help monitor the situation reduces the sense of vulnerability significantly.

Several organisations provide specific support for victims of online abuse and harassment, including helplines, counselling services, and practical advice. These exist in most countries with active civil society organisations focused on digital rights and online safety. Searching for online abuse support in your country will identify relevant services.

Prevention and Ongoing Protection

Several ongoing habits reduce your vulnerability to online harassment and limit its potential impact.

Maintain strict privacy settings on all social media accounts. Restricting your posts to friends rather than the public, limiting who can find your profile through search, and keeping personal information such as your home location, daily routine, and contact details private all reduce your exposure.

Be selective about what personal information you share in online communities, even those that feel safe and private. Online communities can change in character, may be accessible to more people than you realise, and can be accessed by someone who was previously a member even after you leave.

Use different usernames on different platforms rather than a consistent identity that makes it easy to aggregate information about you across multiple sites. Using a variation of your name rather than your full name on public platforms reduces searchability.

Be cautious about the photographs you share online. Photographs can contain embedded location metadata that reveals where they were taken. Modern phones can be set to strip this metadata before sharing, which is worth doing as a default. Photographs of your home, your street, or recognisable local landmarks reduce the difficulty of identifying your location for anyone with motivation to do so.

More on this topic

`n