Published in


Do Not Neglect Your Fish Tank Thermometer When Implementing Cybersecurity

Anything that is connected to your network can be used as an attack vector

Image courtesy of the author.

IoT hacks

“So in war, the way is to avoid what is strong, and strike at what is weak.”

― Sun Tzu, The Art of War

Removing weak points

Network segmentation

DNS Security

Network Security Monitoring and Response



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jakub Jančík

Cybersecurity Enthusiast | Sales Engineer/Account Manager | Freelance Copywriter | LARPer | Gamer | Torturer of Pianos (and Ears)