Improvement: Step 6 of Connected Device Security