Human beings have always sought out ways to communicate more efficiently. Our society has come a long way since the days of the telegraph and radio. Never have we been more inter-connected with our ability to communicate and collect data than we are now. New advances in technology has given us an unprecedented look, into how our industries and commercial sectors operate. The consumer can now be studied with precise observation in real-time. The arrival of the Internet of Things (IoT) has ushered in a new age of mass communication and data collection. First, let us discuss what IoT is and how it is applied in the real world. Simply put, the Internet of Things is a network of Internet connected objects able to collect and exchange data. Kevin Ashton of MIT was the first to mention the Internet of Things in 1999. His goal was to bring radio frequency ID (RFID) to the leaders of P&G. IoT has evolved tremendously since then. It is important to understand how versatile IoT can be. A “thing” in IoT can be a medical device (pacemaker) monitoring vital statistics, a built-in sensor to monitor tire pressure, or a smart thermostat to keep server rooms at acceptable temperatures, and commonly used household devices, such as Nest, Ring doorbell, and Roku boxes. All these examples collect and send data back to the manufacturer. Data is also sent to third-party analytical centers for both marketing and research. IoT is generally subcategorized by device, into three distinct groups: information technology, operational technology, and smart objects.
Michael McLafferty has been researching cyber-security and applied ethical hacking for over nine years. His interest in cyber security began in 2010. At the time, he was creating search engine optimization scripts for various small businesses, with clients asking him to secure their websites, leading to developing a passion for cyber-security and switched gears from search engine optimization. In 2012 he became a private cyber-security consultant for both individuals and small businesses, providing network and endpoint security advice, as well as social engineering awareness training to employees and upper management. In March of 2017, he Co-authored his first book titled “Applied Network Security”. He also has experience as cyber-security researcher, sponsored by local businesses to further the advancement of cyber-security methods and applied knowledge. He is the co-founder of an open society of ethical hackers that meet weekly to discuss and apply new cyber-security skills, with full access to both a lab and cutting edge ethical hacking equipment, to develop new methods in offensive security. Mike is an inventor, with several patents pending on various cyber-security tools and software. With collaboration from his fellow colleagues and continued research, he is committed to reshaping and setting new standards and levels of excellence in the world of cyber-security.