The document discusses the growth of internet-connected devices (IoT) and the risks posed by inadequate security for these devices. It provides strategic principles and best practices for securing IoT devices and systems. The key risks include malicious actors manipulating device data to cause privacy breaches, business disruptions, infrastructure failures. The principles are meant to guide IoT developers, manufacturers, service providers and users in designing, building and deploying secure IoT. Incorporating security from the start, through practices like unique passwords and up-to-date software, is emphasized to reduce risks and costs of breaches.