What can businesses do to guard against vulnerabilities as they bring more connected devices into their IT environments?