Internet of Things (IoT) Devices

October is Cyber Security month and the FBI has reiterated that cyber criminals are targeting IoT devices. Some examples of IoT devices include: new garage door openers, webcams, smart TV cameras, pc cameras, smart products to order supplies online, internet lookup devices, doorbell video and audio cam devices, order supplies online devices, internet radio, internet lookup, refrigerator camera and temperature devices, home security systems, thermostat monitors, smart tv, smart motion sensors, smart electrical outlets, smart motion sensors, smart appliances, fitness trackers, virtual reality games, etc..... The number of IoT devices in use is expected to increase from 5 billion in 2016 to an estimated 20 to 50 billion by 2020. Once a cyber criminal takes control of an IoT device, they can attack other networks and shut down systems with a distributed denial of service (DDoS) attack. Make sure that there is security on your IoT devices. They can be activated remotely without your knowledge so be careful what you say around the computer, phone, tablet, or TV! It can be recorded.


要查看或添加评论,请登录

Dr. William A. Kessler的更多文章

  • Cloud IT Platform Best Practices

    Cloud IT Platform Best Practices

    So, after working in the Cloud Technology platforms since 2005, here is my Cloud Best Practices Solution: 1. Avoid…

  • Copying Microsoft Word Files

    Copying Microsoft Word Files

    If you are copying a Microsoft Word file or image within it and get the message "This document contains fields that can…

  • Home Router Security

    Home Router Security

    Since many people now work from home here is a way to keep your home router fast, up to date and secure. Set security…

  • How To Get the Best Buy for a Laptop

    How To Get the Best Buy for a Laptop

  • The Cloud Security Threats Are Winning!

    The Cloud Security Threats Are Winning!

    Dr. William Kessler Date: 6/5/2020 The Cloud Security Threats are Winning! Abstract: Critical Issue #1: Pandemic –…

  • Building a Bottoms-Up Cloud Security Framework

    Building a Bottoms-Up Cloud Security Framework

    Article: Building a Bottoms-Up Cloud Security Framework Name: Dr. William A.

  • Zero Trust Security Architecture

    Zero Trust Security Architecture

    Introduction: As an introduction, many security breaches occur because cyber hackers identify and exploit security…

    2 条评论
  • Laptop Buying Tips

    Laptop Buying Tips

    Do not buy a laptop online. Why? Because if it comes to you dead-on-arrival (DOA) then you have to mail it back…

    1 条评论
  • Online Colleges Are Taking Over

    Online Colleges Are Taking Over

    I have been looking at the growth of online colleges and here is my prediction over the next 5 years. Half of all…

  • The Rise of Data Analytics in College Business Programs

    The Rise of Data Analytics in College Business Programs

    After listening to Bloomberg Business Radio this week, I found out the following info. The Columbia School of Business…

    2 条评论

社区洞察

其他会员也浏览了