onnected through various portals such as phones, computers, and other tech devices to the internet, it is imperative for us to give special consideration to security