As data becomes the new currency of the digital marketplace, one of the biggest security challenges organizations face is the number and kinds of endpoint devices that need access to the network. Smartphones, laptops, Chromebooks, tablets, and IoT devices of every function and size now regularly connect to some segment of the network to access data. New hacking tools allow criminals to scan for devices simply looking for a known wireless access point. When it sees one, rather than broadcasting its own SSID, it simply asks what SSID the device is looking for.”]
Source: https://www.csoonline.com/article/3264431/the-blessing-and-curse-of-automation.html

