Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More
What is the Internet of Things (IoT)?
Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? (You are here) Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What … Read More
What is a Denial of Service Attack?
A Denial of Service (DoS) attack is an attack on an individual computer or network that aims to consume as many resources as possible. The main goal of this attack is to deny service to the legitimate users of the computer or network. There are a number of ways in which this can be accomplished, as … Read More
What is a VPN?
A virtual private network (VPN) allows a private network of devices to be securely extended over a public network such as the Internet. This gives the functionality of a typical private network but with the convenience of a public network. VPNs are commonly seen in the corporate world, where having … Read More
What are social media bots and how can I protect myself?
Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots. By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human. … Read More
What is a Firewall and Why do I need one?
What is a Firewall? Firewalls are hardware and/or software systems which protect end users from malicious traffic on the Internet. When data is sent over the Internet, it comes packaged with information about where it is coming from and where it is supposed to go, as well as an indication as to … Read More
What makes a strong password?
With all the data breaches we see on the news these days, it can sometimes be scary to trust companies with your sensitive information. However, in many cases, sensitive data is gained by an attacker taking advantage of users implementing weak passwords. Today, we will look at some examples of … Read More
What is cryptojacking and how does it affect me?
Cryptojacking is a term that has been making its rounds in the news lately. Rightfully so, many users are worried about being caught up in these attacks. So what is cryptojacking exactly? Basically, cryptojacking is an attack which secretly harnesses the power of your computer to "mine" for … Read More
What is “Incognito mode” in Google Chrome and Why would you use it?
What is Incognito Mode? Incognito mode is essentially a setting on your web browser to disallow the storing of local data relating to the websites you surf. When surfing the web in this mode, your browsing history will not be recorded. Also, any additional cookies sent to your browser during this … Read More
What is the future of IoT?
Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More