The first step to secure IoT devices is knowing what is connected. This includes using a device identification and discovery tool that automates three critical IoT security functions:
• Automatically and continuously detects, profiles, and classifies IoT devices on the network.
• Maintains a real-time inventory of devices.
• Provides relevant risk insights for each of these asset classes by continuously monitoring across attack vectors.
By following these industry best practices for IoT security and adopting leading-edge solutions, administrators can understand, manage, and secure asset inventory, including IoT.
Covert cyberattacks on the rise as attackers shift tactics for maximum impact
https://www.balbix.com/insights/addressing-iot-security-challenges/

