How to secure IoT devices Attackers follow the path of least resistance to gain control of IoT devices. Usually, this is through weak credentials. But they can adapt to strong credentials and other security controls. This is the pattern we have seen with many attack vectors.
McAfee recommends blocking known exploits and likely future maneuvers by attackers.