Nine Security Threats Posed By Connected Devices

Security Cannot Be An Afterthought

Businesses should isolate and minimize interaction between smart devices and the rest of the corporate network, Potter said.

IoT-enabled devices should be on a different network than the company's voice or video traffic, Potter said, and should be limited in terms of how much geolocation information they give out. That's because there are people out there looking to get their hands on this information and do something bad with it.

Companies should additionally encrypt whenever possible, Potter said, given how miniscule that cost is when compared with potential liabilities stemming from a breach.

"If you can encrypt, you should," Potter said. "If you're not encrypting, you're doing it wrong."