From f49fe258aa583b5269479effc73bad6c6d0a2b20 Mon Sep 17 00:00:00 2001 From: Kamran Ahmed Date: Wed, 7 Jun 2023 11:22:05 +0100 Subject: [PATCH] chore: add resource under cyber-security:basic-it-skills:connection-types:nfc --- .../content/100-basic-it-skills/101-connection-types/100-nfc.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md index c5a488d1e..825f5b833 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md @@ -33,3 +33,5 @@ To minimize the risks associated with NFC, follow these best practices: - Ensure you're using trusted and secure apps to handle your NFC transactions. In conclusion, understanding the basics of NFC and adhering to security best practices will help ensure that you can safely and effectively use this innovative technology. + +- [The Beginner's Guide to NFCs](https://www.spiceworks.com/tech/networking/articles/what-is-near-field-communication/) \ No newline at end of file