![Security Intelligence Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts113/v4/6f/d9/5c/6fd95cf3-d311-7c25-7975-7d3f1f3aa1c8/mza_2647009549982595660.jpg/100x100bb.jpg)
IoT Security Fact #4: Weak Configurations Will Persist
Security Intelligence Podcast
English - April 11, 2017 12:04 - 13 minutes - 24.8 MB - ★★★★★ - 34 ratingsTechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: IoT Security Fact #3: Shared Secrets Do Not Remain Secret
This episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #4: Weak configurations will persist.
Changing the default configurations of an IoT device takes thought and effort, and for this very reason it too often does not happen. Rather than leaving security in the hands of the end user, device manufacturers should ensure that security options are enabled either by default or as part of an initial setup process.
To learn about all five indisputable facts of IoT security, listen to all the podcasts in this series at bit.ly/2on03cK and view the accompanying infographic at ibm.co/2nwL6oR.