The document discusses how individuals and organizations can become unintended targets in cyber conflicts. It notes that cyber attacks often follow physical protests and tensions between countries. It provides tips on how to identify potential targeting through monitoring related physical protests, cyber attacks against similar organizations, and controversial business decisions. The document also categorizes different types of targets and their likelihood of facing short or long-term attacks. It closes by questioning if standard cyber defenses are sufficient against sophisticated, persistent threats.