A company has implemented several IoT devices across their office, including smart speakers for automating meeting room scheduling via voice commands. The IT department is tasked with ensuring that these smart speakers do not become a security liability. Which of the following actions would BEST ensure the secure integration of these devices into the corporate network?
Placing the smart speakers in a segregated network and ensuring they have up-to-date firmware.
Using strong, unique passwords for the administration interface of each smart speaker.
Configuring the smart speakers to use the main corporate WiFi with access to all internal resources.
Disabling any unnecessary services and features on the devices that are not used for their primary function.