This document discusses IoT security and the risks posed by insecure IoT devices. It describes the author's background and journey working with embedded systems and information security. Key topics covered include common IoT device architectures and attack surfaces, the Mirai malware which exploited default credentials to form botnets for DDoS attacks, and lessons learned around using strong unique passwords, limiting exposed interfaces and ports, and avoiding public internet access when possible.