Skip to content
Kevin Wells

Kevin Wells

  • HOME
  • Skills & Experience
  • Current Threats & Trends
  • Articles
    • Automation & MonitoringStreamline operations with Ansible workflows, logging pipelines, and proactive monitoring.
    • Backups & DRProtect data and maintain continuity with resilient backup and recovery strategies.
    • Cloud SecurityDefend AWS and hybrid environments with strong identity, policy, and monitoring controls.
    • Identity & Access Management (IAM)Secure access with SSH keys, sudo, PAM, and cloud IAM roles.
    • System HardeningSecure Linux systems through patching, CIS benchmarks, and OS lockdown.
    • Tools & CheatsheetsPractical quick-reference guides for Linux and cloud security administrators.
  • Resources
  • About
  • Contact

digital security

Digital Security Threats in 2017

August 20, 2025January 7, 2017 by editor

With the continued growth of online services and e-commerce, digital security is as important as ever. So here’s my round-up of digital security threats in 2017 to watch out for. Digital Security Threats in 2017 1. IoT Attacks The variety and volume of consumer IoT or “Internet of Things” devices on the market is now … Read more

Categories Blog, IT Posts Tags computer security, digital security, hackers
  • Privacy & Cookies
  • Terms & Legal
  • Disclosures & Copyright
  • Contact

This site uses cookies. Before using the site please refer to the Privacy & Cookie Policy page. By continuing to use this site you are agreeing to the use of cookies and as constituting acceptance of the Terms of Use.