When we use a device other than a desktop, laptop, or phone, that’s an IoT device. We see them in our offices every day: IP phones, printers, smart TVs, teleconferencing tools, surveillance cameras, building access technologies, and more. These network-connected devices are all targets for attackers, as they are not properly secured due to their lack of Endpoint Protection.
The biggest challenge is that IoT devices were designed with functionality and not security in mind, which is why the underlying mechanisms for the intended connectivity are inherently insecure. This has led to devices being leveraged by hackers at many stages of the attack chain in order to breach security systems. It doesn’t necessarily matter whether it’s as a gateway or access point, or if the devices are utilized as an army against a network or service. The security required is the same.