Strategies to Protect Against Security Violations During the Adoption of the Internet of Things by Manufacturers