I find it pretty amazing the speed all of these companies are heading towards connecting everything conceivable to the internet, yet they really don't appear to give much of a shit about leaving the doors wide open for hackers to have some fun.
It would be far more reassuring had they provably solved device security before running down this road. I don't really fancy some Russian midget calling me up and threatening to drive me into the nearest brick wall if I don't pay up.
I have to seriously question how much of this is a bug and how much a feature. And also how much is a mandate.
---
Another practical way for us outsiders to try to deal with the problem would be sort of a crowd-learning system for internal networks. I'm thinking along the lines of a reasonably easy-to-use network analysis tool which could spot suspicious device behavior and combine efforts on notation and analysis. At least it might help spot and reverse engineer abuse and shame/warn of vendors who allow it of their wares.
I've looked around casually for such efforts from time to time and have not seen any. Nor have I tried to roll-my-own since I'm burnt out on software engineering and have been for the last few years.