Or at least centralize the reporting and control separate from the actual equipment. You have a computer that interacts with the equipment rather than having the equipment plugged straight to the internet. First the bad guys have to get through the firewalls, then compromise the command and control computer. You then watch one computer instead of 100s of devices.
Bookmarks