Posts

Showing posts with the label Internet of Things

What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

The Internet of Things and possible vulnerabilities

  So, what is the Internet of Things anyway?        The Internet of Things or IoT is an extensive network of devices that are constantly sharing information. For example, all over the world, there are millions of devices, such as smartphones, TVs, computers, game consoles, tablets, refrigerators, stoves, and even havoc systems connected to the Internet. Moreover, other things, such as motor vehicles, trains, ships, and other things, are now obtaining access to the Internet. All these devices are exchanging information every day other the Internet. Thus, the Internet of things. It is strange to think about these things as having access to the Internet; however, some of these items require receiving updated firmware like refrigerators or electric cars. These updates carry new features, and security updates that protect these items from attack as hackers look to gain access to obtain financial information or access to sensitive information. But why would someone what to gain access to m