In part 1 of this series, we covered why distributed Internet of Things (IoT) devices are attractive and vulnerable targets for cyber criminals and hackers. By their nature, they are relatively easy to compromise and are often connected to networks with high-value content. Moreover, IoT devices rarely have direct user interaction, so many types of device compromise are likely to go unnoticed and undetected.