When considering IoT systems, which of the following represents the GREATEST ongoing risk after a vulnerability has been discovered?
A . Difficult-to-update firmware
B . Tight integration to existing systems
C . IP address exhaustion
D . Not using industry standards
Answer: B