Remediation: Step Four of Connected Device Security