ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Deal with Internet Trolls

b2ap3_thumbnail_issues_with_internet_trolls_400.jpgLet’s face it: The Internet is filled with opinions, and several of them are undoubtedly wrong. Generally, most mature people will take these opinions with a grain of salt and move on. The other half of the population absolutely must respond. These responses are often less-than-friendly, and some of them are just trying to anger the original poster. We call these people Internet trolls.

When you think of a troll, you might imagine an ugly little creature with a wrinkly face, sharp teeth and claws, and a foul temper. Others might imagine a cute little guy with crazy pink hair. The truth of the matter is that while Internet trolls might not lurk under bridges and steal from passerbyes, their personalities are just as ugly as the creatures of legend. According to everyone’s favorite online encyclopedia, Wikipedia, an Internet troll is:

[…] a person who sows discord on the Internet by starting arguments or upsetting people, by posting inflammatory, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the deliberate intent of provoking readers into an emotional response or of otherwise disrupting normal on-topic discussion.

So, in other words, a troll is a jerk who blatantly goes on the Internet with the intent of upsetting someone, usually the poster of the topic in discussion. Unlike other forms of online threats, the troll can’t be blocked by antivirus or firewalls. They can’t be eliminated with the click of the mouse. No, the troll attacks your business’s blog or social media posts, hoping to incite some response with their “trolling.” If your business fosters interaction with its followers (like it should), you risk feeding the trolls, also known as giving them firepower to do some real damage to your business and its reputation. These trolls are so dangerous that Britain is even considering up to three years of jail time for abusive Internet behavior.

troll tollYou Need to Pay the Troll Toll
Why would anyone go out of their way to do such a thing on the wondrous Internet? Probably for the same reason hackers steal personal information from individuals, or infect systems with malware; for the sake of causing strife and chaos. Or, perhaps they are simply immature and looking to add some sort of meaning to their insignificant existence. Though, there is the possibility that they are just simply offended by the post and feel the need to correct you, but those individuals are few and far between. No, the main reason anyone will troll you is for the thrill of it. Anonymity plays a big role, as well; nobody wants to slander their own name when the Internet provides them the perfect medium to be exactly who they want to be.

Dealing with Internet Trolls
Dealing with trolls can be difficult, especially if they hit a nerve and really push you the wrong way. If you get mad at them, and respond without thinking about what you’re saying carefully, it might have a negative effect on your company’s image. Ultimately, the best way to deal with Internet trolls is to reassess how you deal with criticism (which is what trolling is, in a sense). Discuss what your friends, coworkers, or close relatives think about your ideas. Approach the trolling with an objective view after giving yourself some time to think about it.

Whether you should deal with the trolling is another matter altogether. Letting these people gang up on your posts, blogs, or whatnot will let them believe they can spout whatever nonsense they want without any repercussions. On the other hand, ignoring them can send a message that their actions and outcries are inconsequential and you don’t care.

If you do choose to respond, rather than defend your ideas, technology consultant and writer Jeff Reifman argues that it is better to only address parts of their personal attack which are unwarranted or inaccurate, and “only if you have good intentions.” You don’t want a response to turn into a social media war by stating that they are wrong. This will almost never work in your favor. If people are angry for no reason, they will stay angry for no reason.

In the words of Reifman, “Say your peace, [and] let go of the reaction.” Don’t let Internet trolls get to you. Take your time to formulate a proper response, then let it go. Don’t turn your responses into personal attacks, lest you become no better than the trolls themselves. All you need to remember are these wise words from an anonymous Twitter user: “For every anonymous idiot trashing you online, there are thousands more that quietly love you.” And whatever you do, don’t feed the trolls.

Have you ever been a victim of Internet trolling? How did you deal with the situation? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Small Business Upgrade Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps Managed Service IT Support Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Information Bandwidth Business Technology Encryption App Server Virtualization Blockchain Mobile Device Management WiFi Spam Remote Information Technology History Gmail Budget Office Two-factor Authentication Office 365 Apple Employee/Employer Relationship Cybercrime Health Wi-Fi Big Data Access Control Analytics Data Security Conferencing BDR Vendor Document Management IT Management Compliance Voice over Internet Protocol Employer-Employee Relationship Training Save Money Help Desk Hacking Remote Computing Patch Management Cost Management Remote Monitoring Hacker Customer Service Unified Threat Management Legal Firewall Search... Applications Augmented Reality Best Practice Data storage Word Mobile Office Vulnerabilities IBM Retail Website Alert Managed Services Hiring/Firing Outlook BYOD Password Computing Data loss Vendor Management Hard Drive Project Management Money Law Enforcement Social Sports SaaS DDoS End of Support Websites Marketing Data Breach Printer Running Cable Meetings Mobility iPhone Education Cortana Storage Google Maps Remote Workers Scam Content Filtering Travel Monitoring Virtual Reality Windows 7 Free Resource Healthcare Social Engineering VPN Router Cryptocurrency Black Market How To Windows 11 Cleaning Update User The Internet of Things Robot YouTube Paperless Office Laptop Chrome Antivirus Maintenance Twitter Mobile Computing IT Consultant Computer Care Video Conferencing Microchip Downloads Flexibility Virtual Machines Vulnerability Processor Customer Relationship Management Computer Repair Software as a Service Co-Managed IT Hack Disaster Identity Theft Professional Services Entertainment Data Protection Notifications Unified Communications Google Docs Lithium-ion battery Managed Services Provider Bluetooth Multi-factor Authentication Distributed Denial of Service Office Tips Virtual Private Network Private Cloud Processors Memory Tech Terms Saving Time Current Events HIPAA Managed IT Digital Computers Bitcoin Solutions Politics Machine Learning Settings Telephone Taxes Images 101 Integration Display Solid State Drive Wireless Technology eWaste Excel Employees Drones Physical Security Downtime Chromebook Avoiding Downtime Safety PowerPoint Automobile Holidays Administration Virtual Assistant Presentation Virtual Desktop How To Experience Cooperation Specifications Start Menu Vendor Mangement Phone System Database 2FA Teamwork Hypervisor Shortcuts Samsung Data Storage Equifax Webcam Shopping In Internet of Things Staffing Medical IT Health IT Uninterrupted Power Supply IP Address Network Congestion Business Mangement Tactics Paperless Hard Drive Disposal Hacks SQL Server PCI DSS Reliable Computing Licensing Writing Username Be Proactive Tablets Computer Accessories Startup Gig Economy Freedom of Information Humor Azure Navigation Addiction Supercomputer Business Communications email scam Internet Service Provider Google Calendar Regulations Compliance Scalability Managed IT Service Virus Workplace Strategies Mobile Security Legislation Motion Sickness News Administrator Memes Recovery Text Messaging Competition User Tip Proactive IT Evernote Google Drive Network Management Human Resources Net Neutrality Bring Your Own Device Comparison Financial Data LiFi Entrepreneur Emails Risk Management Fake News IT Documents Knowledge Application Proxy Server Music Corporate Profile Television Telephony Business Intelligence Service Level Agreement Employer Employee Relationship Google Apps Computing Infrastructure Telework Troubleshooting Management Smart Technology Cabling Device security Tablet Wireless Headphones G Suite Smartwatch Microsoft Excel Botnet Communitications Securty Microsoft 365 Mouse Domains Tech Micrsooft VoIP Going Green Tracking Business Cards Procurement Rental Service FinTech Flash Error Web Server CES IT Assessment Telephone Systems Bookmark Business Growth SharePoint Value Term Download Digital Payment Piracy Supply Chain Management Organization Cyber security Business Owner Supply Chain Worker HTML Access Nanotechnology Smart Devices Banking Public Speaking Browsers Google Wallet Messenger Google Play Deep Learning Time Management Upload Public Cloud Software License Remote Working Streaming Media AI Trend Micro Keyboard Social Network Workplace Hosted Solution Spyware Screen Reader Digital Security Cameras Electronic Health Records Business Metrics Audit Transportation Hard Drives Data Analysis Books Wasting Time Security Cameras intranet Trends File Sharing Mobile Technology eCommerce Wireless Language Redundancy Modem Shortcut Inbound Marketing Customer Resource management Scams Society Devices Cache Environment Videos Tip of the week Surveillance Heating/Cooling Fileless Malware Reading Managing Costs Monitors Unified Threat Management Social Networking Gamification Visible Light Communication Workers Company Culture Windows XP SSID Telephone System Cables Windows 8 Regulations Directions Backup and Disaster Recovery CCTV Media Development Printing Employer/Employee Relationships Electronic Payment Relocation Virtual Machine Displays Touchscreen Content Advertising Desktop Accountants Computer Malfunction Reviews Optimization Work/Life Balance Emergency Electronic Medical Records Point of Sale Tech Support

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?