how to manage iot vulnerabilities