Robust IoT authentication process, stringent firmware update policy, Streamlined IoT network, limited IoT platform access, and regular IoT device monitoring are few of the guaranteed practice that helps to enhance IoT security in the enterprise workspace.  However, as the hodgepodge of IoT devices elevates the…