Valtik Studios
Back to blog
IoT SecurityhighUpdated 2026-04-1729 min

IoT Security 2026: The Complete Guide for Consumers and Enterprises

Count the IoT devices on your network right now. The number is higher than you thought. This is the complete 2026 IoT security guide. Consumer and enterprise. Attack surface by device category. Defense stack (router + segmentation + DNS filtering + device hygiene + monitoring). Enterprise IoT platforms (Armis, Claroty, Ordr). Specific product recommendations. 10 fastest consumer + enterprise actions.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

Your IoT is someone's attack surface right now

I count the IoT devices on my own home network every few months as an exercise. The count is always higher than I expect. Smart TV. Echo in the kitchen. Robot vacuum. Ring doorbell. Two outdoor cameras I installed to watch for package theft. Smart thermostat. A handful of smart light bulbs. The air purifier. The bathroom scale that for some reason uploads weight data to a cloud in Seattle. My partner's smart speaker in the bedroom. The old Chromecast. The printer. The gaming console. The fitness tracker. The washer and dryer.

That's a conservative count. Last survey, 23 devices. Every single one of them is a potential network ingress point. None of them will ever receive a security patch. Most will stop getting firmware updates in 2-4 years. Several will continue phoning home to the manufacturer long after that.

This is IoT security in 2026. It's not a niche topic anymore. It's the largest unmanaged attack surface in most homes and businesses. And the pattern of attacks exploiting IoT has matured from "Shodan finds unauthenticated cameras" to "botnets of 5 million compromised home routers launch DDoS against financial infrastructure."

This post is the complete IoT security guide. Consumer and enterprise. What the attack surface looks like. What attackers actually do with it. Defense layers that work. And the specific devices that keep showing up in our engagements.

Who this is for

  • Consumers who want to understand their home network attack surface.
  • Small businesses with retail POS, surveillance cameras, or building automation.
  • Enterprise operators managing IoT fleets.
  • Critical infrastructure operators (water, energy, transportation) with operational technology.
  • Healthcare operators with medical IoT (IV pumps, patient monitors).

The threat model

Different IoT device categories, different threat models.

Consumer IoT

  • Home cameras / doorbells. Primary attack: unauthorized access by stalkers, domestic abusers, or Ring-police-partnership compliance. Secondary: pivot to home network.
  • Smart TVs. Primary attack: data harvesting via ACR. Secondary: pivot to home network, exploit of vulnerable Chromium-based apps.
  • Smart speakers. Primary attack: voice data leak via processing errors or compromise. Secondary: command injection to connected devices.
  • Smart appliances. Primary: data harvesting for advertising. Secondary: pivot via weak firmware.
  • Smart light bulbs / plugs. Primary: botnet recruitment. Secondary: pivot via Zigbee/Z-Wave to other network elements.
  • Fitness trackers + smart watches. Primary: location data leak + health data harvesting.
  • Home routers. The crown jewel. Full network control if compromised. Botnet recruitment, traffic interception, DNS manipulation.

Enterprise IoT

  • IP cameras + NVR. Same as consumer plus corporate espionage risk.
  • Print/copy devices. Document theft. Phone-home functionality. Often run full Linux stacks.
  • Building automation (BACnet, Niagara, Schneider). HVAC, access control, lighting, elevators. Compromise affects physical security.
  • Point-of-sale systems. PCI-DSS scope. Credit card harvesting.
  • VoIP phones. Call interception. Often run full OS that can pivot.
  • Conferencing equipment. Room audio/video surveillance.
  • Industrial control. PLCs, SCADA, OT gear. Nation-state target.
  • Medical devices. Patient safety risk. IV pumps, infusion devices, patient monitors, ventilators.

Why IoT security is particularly hard

Four structural issues that don't apply to general computing.

No update path

Most IoT devices stop receiving firmware updates 2-4 years after release. Many never get updates. The attack surface accumulates indefinitely.

Shared credentials across deployment

Most consumer IoT devices ship with the same default credentials for every unit of a given model. Attackers pull the credentials once from documentation, then have them for every deployed unit.

Weak cryptographic primitives

IoT firmware often predates modern cryptographic practice. Hardcoded keys. Weak random number generators. Unpatched TLS libraries.

Management APIs over unencrypted protocols

UPnP. Telnet. Plaintext HTTP admin interfaces. Half the home router fleet in 2026 still exposes Telnet on the LAN.

The consumer defense stack

What actually helps consumers defend their home networks.

Layer 1. Router security

The single most important consumer IoT control. Everything else is downstream of the router.

  • Replace the ISP-supplied router with something actively supported. Synology, Ubiquiti, ASUS (with AsusWRT-Merlin), pfSense/OPNsense, MikroTik, or a Google/eero/orbi mesh if simplicity matters. The ISP rental never gets patched.
  • Change default admin password. Yes, this is 2026, but this is still necessary.
  • Disable WAN-facing admin. Management from LAN side only.
  • Disable UPnP. It's an open door.
  • Disable WPS. Legacy WiFi auth with known attacks.
  • Keep firmware current. Enable auto-updates if available.
  • Use WPA3 where possible, WPA2-AES as fallback. Never WEP or WPA-TKIP.

Layer 2. Network segmentation

  • Dedicated IoT VLAN. IoT devices on a separate network from your laptops and phones. Most prosumer routers support this. Google Nest WiFi has a guest network. Ubiquiti has full VLAN support. eero has IoT-specific guest networks.
  • Guest network for visitors + low-trust devices. Physical segmentation of "work from home" vs. "kid's Minecraft server" vs. "smart bulbs."
  • Firewall rules between VLANs. IoT network should not initiate connections to the primary LAN. Limit egress to only what devices genuinely need.

Layer 3. DNS filtering

  • NextDNS, AdGuard, Pi-hole, or Cloudflare Gateway. Block known malicious domains at DNS level. Also effective against ACR telemetry from smart TVs.
  • Block specific manufacturer telemetry domains if privacy is a priority.

Layer 4. Device hygiene

  • Disable features you don't use. Voice control off if you don't use it. Camera off if you don't use it.
  • Cover cameras you don't actively need (sticker + removable).
  • Factory reset before disposal and wipe any stored WiFi passwords.
  • Buy less when possible. The most secure device is the one you didn't install.

Layer 5. Monitoring

  • Router logs visibility. What's talking to what?
  • Fingerprint your network. Pi-hole, Syncthing, or dedicated tools (Fing, Firewalla) map devices. Alerts when new device joins.
  • CASB-light tools for home. Firewalla, Bitdefender Box, or Defend Edge add enterprise-ish threat detection to consumer networks.

The enterprise defense stack

Layer 1. Inventory

You can't protect what you can't see. IoT inventory requires:

  • Active scanning. Armis, Claroty xDome, Medigate for medical environments.
  • Passive discovery. SPAN port or TAP feeding traffic analysis tools.
  • Integration with DHCP. Every device that gets an IP is visible.
  • Manual discovery for air-gapped devices. Many OT environments aren't on the main network.

Layer 2. Network segmentation

  • VLANs per device class. Cameras on one VLAN. HVAC on another. POS on another. Not flat.
  • Firewall between segments. Explicit allow rules for legitimate traffic only.
  • East-west traffic monitoring. What should IoT cameras need to talk to? Not much.

Layer 3. Access controls

  • Default credential rotation. Every device with a default password needs its password changed, documented, and rotated on a schedule.
  • Admin interface access limited to specific jump hosts or management networks.
  • MFA for admin interfaces where possible.

Layer 4. Update and maintenance

  • Firmware update cadence. Quarterly minimum.
  • Vendor support check. If vendor has abandoned the product, plan replacement.
  • Out-of-band management where possible for critical OT.

Layer 5. Detection

  • Network behavior analytics. Anomalous IoT traffic is often the first sign of compromise.
  • Syslog / SIEM integration for devices that support it.
  • Incident response playbooks specific to IoT categories.

Specific device categories

IP cameras

The most common compromised IoT device. Hikvision, Dahua, Axis, Hanwha/Samsung, generic Chinese OEMs.

Defense:

  • Replace unsupported devices.
  • Segment from main network.
  • Change default credentials.
  • Disable UPnP.
  • Disable unnecessary services (ONVIF Profile S, FTP upload, etc.).
  • Monitor for firmware updates.

Red flag vendors: generic Chinese OEM cameras with admin panels you can find via Shodan. If there is no clear manufacturer accountability and no security advisory history, the device probably isn't safe.

Network printers

Underrated attack surface. Most enterprise printers run full Linux stacks. HP, Canon, Xerox, Lexmark, Ricoh, Brother.

Defense:

  • Change default password.
  • Disable unnecessary protocols (Telnet, unencrypted HTTP admin).
  • Segment to printer VLAN.
  • Disable cloud printing if not used.
  • Disable stored job history.
  • Update firmware.

Smart TVs

Not much you can do beyond DNS filtering and network segmentation. Assume any TV on your network is broadcasting telemetry to the manufacturer continuously.

Medical devices

Regulated under HIPAA, FDA pre-market approval. Often can't be patched without breaking FDA compliance. Special handling:

  • MDS2 forms from manufacturer documenting security posture
  • Network segmentation to dedicated clinical VLAN
  • Compensating controls where patching isn't possible
  • Decommissioning plan for unsupported devices

Industrial control / OT

Special domain. Different standards (IEC 62443, NIST SP 800-82). Different attack tooling (Industroyer, Triton, PIPEDREAM). Different defenders (Claroty, Dragos, Nozomi). Beyond the scope of this post but worth noting that standard IT security approaches often don't apply.

Specific attack patterns we see

Mirai-style botnet recruitment

Automated scanning for IoT devices with default credentials. Compromise. Enlist in botnet. Use for DDoS, click fraud, or further scanning.

Scale: hundreds of millions of compromised devices globally in various botnets.

UPnP abuse for router compromise

UPnP allows devices to open ports on the router. Malicious devices (or malware on compromised devices) use UPnP to expose services.

Unauthenticated camera streams

Shodan queries find camera streams with no authentication. Stalking scenarios, corporate espionage, general voyeurism.

Consumer router compromise for traffic interception

Router compromise allows DNS manipulation, traffic interception, and man-in-the-middle attacks against all home network traffic.

Smart home takeover via cloud service compromise

Google Home, Alexa, HomeKit. Compromise of the cloud account gives the attacker control of every paired device.

Medical device incidents

Ransomware that affects hospital networks often propagates to medical devices. Not patient safety attacks directly, but operational disruption.

The specific consumer product recommendations

Not comprehensive. Just the ones I actively recommend to family.

Networking

  • Ubiquiti UniFi Dream Router or Dream Machine for tech-enthusiast households.
  • eero Pro 6E for simple mesh.
  • Google Nest WiFi Pro for Google-ecosystem users.
  • Avoid ISP-rented routers. Buy your own.

IoT hub / coordination

  • Home Assistant self-hosted if you're technical. Local processing, no cloud dependency.
  • Hubitat if you want less DIY.
  • Avoid cloud-only systems for anything that matters.

Cameras (if you need them)

  • Unifi Protect for local-first recording.
  • Eufy (after checking which models still use local storage vs. forced cloud).
  • Apple HomeKit Secure Video if you're Apple-centric.
  • Avoid brands with no published security disclosure policy.

Smart speakers (if you want them)

  • Apple HomePod is most privacy-respecting if Apple is acceptable.
  • Self-hosted alternatives like Mycroft or Rhasspy exist but require significant effort.

DNS filtering

  • NextDNS for per-device control and cloud dashboard.
  • Pi-hole for self-hosted.
  • AdGuard Home for self-hosted alternative with more features.

The enterprise product landscape

IoT security platforms

  • Armis. Market leader in agentless IoT/OT discovery + security. $$$.
  • Claroty xDome. Strong for OT-heavy environments.
  • Medigate (Claroty). Healthcare-focused.
  • Nozomi Networks. OT focus.
  • Forescout. Network access control with IoT depth.
  • Ordr. Connected device security.

Network access control (NAC)

  • Cisco ISE.
  • Aruba ClearPass.
  • Portnox.

Used together, these platforms provide IoT inventory, posture assessment, and network enforcement.

The 10 fastest things consumers can do

  1. Replace your ISP rental router with something you own.
  2. Set up a dedicated IoT VLAN on your router.
  3. Change every default IoT password. Store in password manager.
  4. Enable DNS filtering via NextDNS or equivalent.
  5. Disable UPnP on your router.
  6. Buy cameras with local storage, not cloud-only.
  7. Cover cameras when not in use.
  8. Factory reset devices before disposal.
  9. Keep firmware current. Enable auto-updates.
  10. Audit your network. Know what's on it.

The 10 fastest things small businesses can do

  1. Replace unsupported network equipment.
  2. Segment IoT/OT from the main network.
  3. Inventory connected devices.
  4. Change default passwords on every device.
  5. Enable firmware auto-update where available.
  6. Plan replacement for end-of-life devices.
  7. Deploy NAC to control device onboarding.
  8. Log IoT traffic to SIEM.
  9. Create incident response playbooks for IoT compromise.
  10. Include IoT in annual security assessments.

Working with us

We run IoT + OT security assessments for mid-market + enterprise clients. Our typical engagement:

  • Connected device inventory
  • Network segmentation assessment
  • Default credential audit
  • Firmware update posture review
  • Vendor lifecycle assessment
  • Network segmentation recommendations
  • Incident response integration

For healthcare environments, we specifically cover medical device MDS2 review and HIPAA-aligned segmentation. For retail, PCI-scoped IoT (POS, security cameras in cardholder environments). For manufacturing, basic OT/IT convergence review (we refer out to specialist OT firms for deep ICS work).

Valtik Studios, valtikstudios.com.

iot securityot securitysmart homemedical deviceshome networknetwork segmentationiot botnetcomplete guide

Want us to check your IoT Security setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.