A company has recently deployed a new IoT device in their network. During the security assessment, it was found that the device is still using default credentials. Which of the following actions is the BEST immediate step to mitigate the potential exploitation of this device?
Disable remote management features on the IoT device to limit network-based attacks.
Conduct a thorough vulnerability scan of the device to find potential weaknesses.
Update the IoT device firmware to the latest version available from the manufacturer.
Change the default username and password to a complex, unique credential set.
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts