IoT is a huge topic, especially for enterprises. Many have been doing it for years, and many more are interested in doing it for the first time. Companies like Target have proven that it is often these smaller and non-obvious machines that are being used to penetrate systems and cause havoc or steal information. Utilizing an air-gap or analog segregations only make manipulations more difficult to detect. Microsoft has created a very robust set of Azure services to mitigate any qualms about using their cloud services, but what about their connected devices? Could an infiltrator access these to penetrate the system, or modify their programming to cause malicious damage?
by Carl Schweitzer