Washing machines, refrigerators, cars, exercise bikes, alarm systems, security cameras – these are just a few of the many “things” that are being connected to the Internet. It’s a remote manager’s dream, but it’s a security professional’s nightmare. Read more here:
About The Author
Deb Shinder
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.
Read Next
GFI Software Announces Revolutionary AppManager™ Product to Unify Management of IT Solutions
Cloud-based platform consolidates software interfaces and customer accounts for managed service providers Ft. Lauderdale, FL (February 15, 2023) — GFI Software, the global leader in…
Static vs Dynamic IP Address
Most people are familiar with Internet Protocol (IP) Addresses, but many people don’t know you have 2 types. In this article, you’ll learn about static…
Types of Attack Vectors and How to Prevent Them
An attack vector is a cybersecurity term that describes a method used by a cybercriminal to gain access to your computer or network. These attack…
How to Break a String in YAML over Multiple Lines
YAML is a human-readable data serialization format. You can use it to store data for programs, and as an alternative to XML. YAML files are…