Criddle, L. (n.d.). What is Social Engineering? Retrieved from https://www.webroot.com/us/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
Ferber, S. (2013). How the Internet of Things Changes Everything. Retrieved from https://hbr.org/2013/05/how-the-internet-of-things-cha
Greenberg, P. (2016). Security Breach Notification Laws. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Unknown (n.d.). Identifying and Preventing Future Security Threats. Retrieved from http://www.global-economic-symposium.org/knowledgebase/the-global-polity/identifying-and-preventing-future-security-threats
Zaharia, A. (n.d.). The 10 Critical Steps to Take After a Data Security Breach. Retrieved from https://heimdalsecurity.com/blog/critical-10-steps-data-security-breach/
Ferber, S. (2013). How the Internet of Things Changes Everything. Retrieved from https://hbr.org/2013/05/how-the-internet-of-things-cha
Greenberg, P. (2016). Security Breach Notification Laws. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Unknown (n.d.). Identifying and Preventing Future Security Threats. Retrieved from http://www.global-economic-symposium.org/knowledgebase/the-global-polity/identifying-and-preventing-future-security-threats
Zaharia, A. (n.d.). The 10 Critical Steps to Take After a Data Security Breach. Retrieved from https://heimdalsecurity.com/blog/critical-10-steps-data-security-breach/