Securing IoT Vulnerabilities in the Smart Home Part II | Synack Blog