<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Tactical Hermit]]></provider_name><provider_url><![CDATA[https://hcsblogdotorg.wordpress.com]]></provider_url><author_name><![CDATA[The Tactical Hermit]]></author_name><author_url><![CDATA[https://hcsblogdotorg.wordpress.com/author/thetacticalhermit/]]></author_url><title><![CDATA[Cyber Threats &#8211; 3 Easy Steps To Getting Your Door Kicked&nbsp;In]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><img loading="lazy" data-attachment-id="18297" data-permalink="https://hcsblogdotorg.wordpress.com/2016/08/09/cyber-threats-3-easy-steps-to-getting-your-door-kicked-in/cyber-2/" data-orig-file="https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg" data-orig-size="298,169" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Cyber" data-image-description="" data-medium-file="https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg?w=298" data-large-file="https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg?w=298" class="aligncenter size-full wp-image-18297" src="https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg?w=298&#038;h=169" alt="Cyber" width="298" height="169" srcset="https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg 298w, https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg?w=150&amp;h=85 150w" sizes="(max-width: 298px) 100vw, 298px" /></p>
<p style="text-align:center;"><strong>By Mr. A</strong></p>
<p><span style="font-weight:400;">The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart  phones, and tablets really understand what’s going on ‘under the hood’ and how they can be negatively impacted by this. </span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Reckless teens post party pictures and vomit up ridiculous and petty comments through multiple social media outlets. Then they wonder a few years later why they were turned down for a job.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Employees exercise ‘free speech’ online and one day find out they are terminated for making statements the company finds insensitive.</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Teenage girls post mildly inappropriate pictures not knowing those pictures may contain the exact GPS location of their home or school</span></li>
</ul>
<p><span style="font-weight:400;">In 1984, the idea of Big Brother seeing all you do what put forth by George Orwell. What people have a hard time understanding is that in the age of big data almost anyone can be Big Brother and you may be feeding them everything they need to target you. </span></p>
<p><span style="font-weight:400;">The latest example of this can be found in new <strong><a href="http://www.christiantoday.com/article/entire.church.in.u.s.on.isis.kill.lists.names.taken.from.church.directories.on.internet/91552.htm">ISIS ‘Kill List’ gathered from church directories</a></strong> posted online. In many states property tax records are online. Targeting and entire church, the pastors, or specific individuals within the congregation is as easy as 1-2-3.</span></p>
<ol>
<li><span style="font-weight:400;">Find a church website</span></li>
<li>Find a pastor’s name</li>
<li>Search property tax records</li>
</ol>
<p><span style="font-weight:400;">Done. </span></p>
<p><span style="font-weight:400;">You need to recognize something right now.<strong> NONE</strong> of this required ‘hacking’, attacker kits, or any sophistication outside of being able to do a Google search. If these 3 steps aren’t sufficient, very simple social engineering can manipulate the remaining information. </span></p>
<p><span style="font-weight:400;">Do you really want everything you do posted on Facebook? Do you want your teens posting on Instagram 10x a day? It doesn’t take very much at all to go from ‘online’ to a bad guy kicking down your front door.</span></p>
<p>Stay Alert, Stay Armed, Watch What You Do Online and Stay Dangerous!</p>
<p>&nbsp;</p>
]]></html><thumbnail_url><![CDATA[https://hcsblogdotorg.files.wordpress.com/2016/08/cyber.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[298]]></thumbnail_width><thumbnail_height><![CDATA[169]]></thumbnail_height></oembed>