diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md index c5a488d1e..825f5b833 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md @@ -33,3 +33,5 @@ To minimize the risks associated with NFC, follow these best practices: - Ensure you're using trusted and secure apps to handle your NFC transactions. In conclusion, understanding the basics of NFC and adhering to security best practices will help ensure that you can safely and effectively use this innovative technology. + +- [The Beginner's Guide to NFCs](https://www.spiceworks.com/tech/networking/articles/what-is-near-field-communication/) \ No newline at end of file