THE HACKER

Stay alert! Watch out for your great enemy, the devil. He prowls around like a roaring lion, looking for someone to devour. Stand firm against him, and be strong in your faith. [1 Peter 5:8-9b (NLT)]

red shouldered hawkAfter asking us how we protect our personal safety, the cyber-security specialist asked how we protect ourselves from cyber attacks. One woman proudly told how Microsoft had recently saved her from a hacking attempt. After a message popped up telling her to call them, she gave them remote access to her computer. The necessary patch and technical advice only cost $700 and now her computer was secure. Until the speaker told her, she didn’t know the hack was the $700 she’d spent, access to her credit card, and possible malware now active on her computer. While she never would have allowed a complete stranger into her home, she unwittingly opened the door to a criminal and welcomed him into her life.

Following the seminar, I couldn’t help but think about Satan. Scripture describes him as a serpent, lion, liar, thief, and tempter with adjectives like prowling, cunning and crafty. Those same words describe a hacker rather well. Both Satan and the hacker want to take over our lives and they can do it without our even realizing it’s been done. The weakest link in both cases is the user—us. Outside consultants regularly try to hack into our bank and the good news is that their security software works. Unfortunately, in every test, someone (who clearly knows better) was conned into replying, hyperlinking, or opening an attachment. When Satan comes trolling, how often do we err by ignoring God’s guidelines, not examining the source of the message, going somewhere we shouldn’t, or letting curiosity get the best of us?

Our speaker spoke of maintaining the security of the devices and networks we use. Since new hacking techniques are developed continually, once secured doesn’t mean forever secure; software must be updated to stay current with new threats. Once saved doesn’t mean forever safe, either. We must keep updating our soul’s software with regular prayer, Bible study, and church. Where we use our devices and the sort of data we transmit and receive affects their safety and where we go and what we put into our minds affects our souls. We don’t hang around dangerous neighborhoods but, sometimes, that’s exactly what we do with our computers and phones or our friends and media choices! When the considering the importance of backing up data, I thought of the value of Christian friends who have our backs and both encourage and support us in times of trouble—times when we’re most vulnerable to Satan’s attack.

Two-factor authentication (2FA) was another security feature discussed. Although a website can use 2FA to make sure it is us, we should use 2FA to make sure those great ideas we get have come from God rather than the enemy. A little two-factor authentication in the way of seeing whether those thoughts match up with God’s word and Jesus’s actions could keep us out of a lot of trouble.

Good cyber-security habits include malware protection, virtual private networks, cloud storage, secure routers, password protection, 2FA, and common sense. None of those, however, will protect us if we fail to use them. The same goes for the armor of God. We’ve been given the best protection money can’t buy but God’s armor won’t defend us from the enemy if we don’t put it on!

A final word: Be strong in the Lord and in his mighty power. Put on all of God’s armor so that you will be able to stand firm against all strategies of the devil. For we are not fighting against flesh-and-blood enemies, but against evil rulers and authorities of the unseen world, against mighty powers in this dark world, and against evil spirits in the heavenly places. [Ephesians 6:10-12 (NLT)]

Copyright ©2018 jsjdevotions. All rights reserved.