Whenever a new technology is adopted, there are teething problems. The user interfaces of smart devices are generally mobile apps that typically require users to go through painstaking processes of installation, account creation, pairing and configuration. Or worse still, the device might only communicate its status to users through a series of LEDs that make cracking the enigma code seem trivial by comparison.
Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.
There's been a lot of talk about how to use technology to protect against advanced targeted attacks, but in fact, technology is rarely the issue. These basics must be covered first and foremost before you even begin to think about technology.