A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers

James Scott, Senior Fellow, Institute for Critical Infrastructure Technology