{"id":18295,"date":"2016-08-09T18:00:47","date_gmt":"2016-08-09T23:00:47","guid":{"rendered":"http:\/\/thetacticalhermit.com\/?p=18295"},"modified":"2016-08-09T18:00:47","modified_gmt":"2016-08-09T23:00:47","slug":"cyber-threats-3-easy-steps-to-getting-your-door-kicked-in","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/08\/09\/cyber-threats-3-easy-steps-to-getting-your-door-kicked-in\/","title":{"rendered":"Cyber Threats &#8211; 3 Easy Steps To Getting Your Door Kicked In"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-18297\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/08\/cyber.jpg\" alt=\"Cyber\" width=\"298\" height=\"169\" \/><\/p>\n<p style=\"text-align:center;\"><strong>By Mr. A<\/strong><\/p>\n<p><span style=\"font-weight:400;\">The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart \u00a0phones, and tablets really understand what\u2019s going on \u2018under the hood\u2019 and how they can be negatively impacted by this. <\/span><\/p>\n<ul>\n<li style=\"font-weight:400;\"><span style=\"font-weight:400;\">Reckless teens post party pictures and vomit up ridiculous and petty comments through multiple social media outlets. Then they wonder a few years later why they were turned down for a job.<\/span><\/li>\n<li style=\"font-weight:400;\"><span style=\"font-weight:400;\">Employees exercise \u2018free speech\u2019 online and one day find out they are terminated for making statements the company finds insensitive.<\/span><\/li>\n<li style=\"font-weight:400;\"><span style=\"font-weight:400;\">Teenage girls post mildly inappropriate pictures not knowing those pictures may contain the exact GPS location of their home or school<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight:400;\">In 1984, the idea of Big Brother seeing all you do what put forth by George Orwell. What people have a hard time understanding is that in the age of big data almost anyone can be Big Brother and you may be feeding them everything they need to target you. <\/span><\/p>\n<p><span style=\"font-weight:400;\">The latest example of this can be found in new <strong><a href=\"http:\/\/www.christiantoday.com\/article\/entire.church.in.u.s.on.isis.kill.lists.names.taken.from.church.directories.on.internet\/91552.htm\">ISIS \u2018Kill List\u2019 gathered from church directories<\/a><\/strong> posted online. In many states property tax records are online. Targeting and entire church, the pastors, or specific individuals within the congregation is as easy as 1-2-3.<\/span><\/p>\n<ol>\n<li><span style=\"font-weight:400;\">Find a church website<\/span><\/li>\n<li>Find a pastor\u2019s name<\/li>\n<li>Search property tax records<\/li>\n<\/ol>\n<p><span style=\"font-weight:400;\">Done. <\/span><\/p>\n<p><span style=\"font-weight:400;\">You need to recognize something right now.<strong> NONE<\/strong> of this required \u2018hacking\u2019, attacker kits, or any sophistication outside of being able to do a Google search. If these 3 steps aren\u2019t sufficient, very simple social engineering can manipulate the remaining information. <\/span><\/p>\n<p><span style=\"font-weight:400;\">Do you really want everything you do posted on Facebook? Do you want your teens posting on Instagram 10x a day? It doesn\u2019t take very much at all to go from \u2018online\u2019 to a bad guy kicking down your front door.<\/span><\/p>\n<p>Stay Alert, Stay Armed, Watch What You Do Online and Stay Dangerous!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mr. A The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart \u00a0phones, and tablets really understand&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,13,74,1317,4912,4126,883,65,3712],"tags":[881,13255,223,13256,13257,4449,13258],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/18295"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=18295"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/18295\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=18295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=18295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=18295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}