how and when to spot cyberactivity