New! Try the FREE Predictive Security Plugin for WordPress – Scan, Secure & Stay Safe in Seconds!

Current CyberSecurity Advisories

Guidance for practitioners supporting victims of technology-facilitated domestic abuse

Release date
28 July 2025
Alert rating
MEDIUM

Description

Practical advice to help victims of cyber-enabled domestic abuse, stalking and harassment, including control, coercion, threatening behaviour, or violence.

Audience

28 July 2025

Current update

Working in partnership with charities, law enforcement, and independent domestic violence advisors, the NCSC offers bespoke guidance to support practitioners working with victims of technology-facilitated domestic abuse, stalking & harassment.

Technology-facilitated domestic abuse relates to the use of technology to facilitate domestic abuse offences, such as incidents of control, coercion, threatening behaviour, violence or abuse. This can range from monitoring emails, social media activity and internet history, to using smart cameras and speakers to covertly monitor victims in their own homes.

Cases of domestic abuse increasingly involve the use of technology. Charities supporting victims have reported a rise in the number of people seeking advice related to technology-facilitated domestic abuse. This trend is unsurprising, given our growing reliance on internet-connected devices—whether at work, at home, or on the go.

Our guidance has been written for frontline practitioners who are supporting victims of technology-facilitated domestic abuse. It provides clear, practical advice that can be used in everyday scenarios to protect victims. It includes a section on preventative measures that victims can take to reduce the likelihood of an abuser being able to monitor their phones, computers, smart devices and online accounts.

Protect your assets with Predictive

TisaAssist bot
🤖 Hello, how can I assist you today?
I can help you with:
✅ Answer questions related to the website.
✅ Help you understand things you don't know.
❓ What's Tisalabs
💻 What's IoT
🔒 Why sensor data must be protected?