Which action is the best step to protect IoT devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
A. Turning IoT devices off when not in use
B. Removing IoT devices from the network
C. Applying security updates promptly
D. Using encryption for communications
The Correct Answer is (C) Applying security updates promptly.
The best technique companies can use to protect IoT devices from being compromised and used as access points to a network is to apply security updates immediately.