We often don’t realize how much our global economy is tied into the internet and how incredibly vulnerable it is to Cyber Attacks, but by understanding the potential dangers of this threat and having a solid emergency urban survival plan in case of such occurrences, you should be able to ride out the storm until systems get back online. Cyber security has been an ongoing concern for governmental officials since the late 1990’s. With your own personal emergency urban survival kit made and ready to use at any time, you will be far less effected by the possible negative consequences. We can’t stress enough how important it is to have a basic BOB (bug out bag) along with a solid plan and understanding of the potential threats.
Possible Results from Cyber Attacks
The thought of a nation crippling cyber attack may seem quite outlandish to you and other readers but keep in mind that “enemy” nations like China, North Korea, Iran, and etc. have entire military divisions dedicated to cyber warfare. There is an absolute certainty among security experts that major power grids and infrastructure systems have already been hampered with and have silent viruses ready for the signal to shut down and disrupt the system.
Although the danger of cyber-attacks do not endanger our physical well-being in most cases, the resulting aftermath can still be quite severe. Everything from power grids to cell phone towers, online banking, ATMs and even the grocery store cash registers are all now connected electronically to some sort of digital server. You will need a plan of action prepared in advance, an emergency urban survival plan against cyber-attacks.
A cyber-attack could potentially come in the form of a computer virus that debilitates the entire national internet infrastructure. When this happens, your ability to purchase simple bread and water might be significantly hampered. You might be without power for extended periods of time until the virus can be located and the damages to the national power grid are repaired. An emergency urban survival kit will help you endure the ensuing national drama and chaos that is sure to follow.
Think about it. When was the last time that you went to the gas station and paid in cash? You may have paid in crisp green money, but it was most assuredly rung up on a digital cash register, and all of those gas pumps are now digital as well. No longer can we simply lift the handle and place the nozzle into our tank for immediate gasoline.
The effects of a successful cyber-attack will be wide ranging and total. If you do not already have an emergency urban survival plan in place, you’ll definitely want to get one going ASAP. Also by constructing an emergency urban survival kit in advance, you will be well ahead of the game.
What to Include in your Emergency Kit
- Keep a stockpile of properly stored water and non-perishable food items along with gear that will allow you to hunt and cook your food. Maintain a supply of at least several weeks.
- If you can afford it, have a small amount of cash and barter items hidden away in a safe in an easily accessible location for emergencies such as these.
- Keep a small supply of standard medicines including aspirin and rubbing alcohol along with a suitable first aid kit.
- Include flashlights, battery operated radios and additional batteries in your emergency urban survival kit. Also consider a solar powered battery charger and a HAM radio as they can be very valuable in a SHTF situation.
What to do in the event of a Cyber-Attack
- Locate and secure your emergency urban survival kit. Hide it in a safe location.
- If a warning is announced by the local, state or federal government that a cyber-attack is in the works, immediately disconnect your computers and all electronic devices, such as televisions, radios and even your handheld portable phones from the internet.
- Next, you would run a complete and thorough scan of your computers, laptops and PDA’s to make sure that they are not infected.
- If you find an issue or cause for concern, immediately preform a restoration of your systems from a previous system configuration from a time well before the significant threat was ascertained.