IT professionals have to treat internet of things (IoT) vulnerabilities as
they would vulnerabilities in databases or web applications. Any flaw can
bring unwelcome attention, for those making affected products and those
using them. Any flaw may prove useful to compromise other systems on the
network. When everything is connected, security is only as strong as the
weakest node on the network.
↧