Social engineering might not be something that springs to mind when you think about computer security and cyber threats, but it’s one of the most common exploits used by hackers to gain access to company networks and confidential information. To help your business remain secure when implementing IoT,