IoT Security Fact #4: Weak Configurations Will Persist

Published: April 11, 2017, 12:04 p.m.

This episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #4: Weak configurations will persist. Changing the default configurations of an IoT device takes thought and effort, and for this very reason it too often does not happen. Rather than leaving security in the hands of the end user, device manufacturers should ensure that security options are enabled either by default or as part of an initial setup process. To learn about all five indisputable facts of IoT security, listen to all the podcasts in this series at bit.ly/2on03cK and view the accompanying infographic at ibm.co/2nwL6oR.