If 2015 was the year of the Internet of Things, 2016 could be the year of the hacked Internet of Things. That could mean a lot of headaches for CIOs, whether they're fans of these new devices themselves or will be dealing with employees connecting them at work and managing the potential security exposure that brings.\u00a0"The issue to date is that devices are vulnerable just by the fact that they exist and can connect to the Internet," says Jerry Irvine, member of the U.S. Chamber of Commerce\u2019s Cybersecurity Leadership Council and CIO of Prescient Solutions. "Anybody can get to a device if you don't secure them properly."\u00a0[ ALSO ON CSO: 8 of the most unsettling things you'll find on the darknet ]One of the reasons why it's a big hacker target: It's, well, big. Gartner estimates that 6.4 billion connected things will be in use by 2016, up 30 percent from last year. They also predict that 5.5 million new things will get connected every day.\u00a0That's a lot of possible portals for bad players to get in.\u00a0The IoT threatOne big problem with these devices, says Irvine, is that they're not always built with security in mind, which is why they can be the backdoor into infiltrating a system that's otherwise guarded.\u00a0Think of e-readers, Irvine says. \u201cThey're easily hackable because they have no antivirus system, no data loss applications." Another example he gives: smoke alarms. There's no real security protection on them, not like you'd find with your typical laptop or smartphone. If someone gets in through that smoke alarm, and you don't have a wall between where it connects to your computer, that bad guy can get right in.\u00a0"Remember, when Target was hacked, they were hacked through their heating and air conditioning system," Irvine says.\u00a0\u00a0However, there are some steps you can take. The first is to keep devices updated. "Operating systems on their firmware become vulnerable," Irvine says. "Updates are made because someone outside of the company has notified the company that there is some kind of weakness." \u00a0\u00a0Another no brainer, he says: a strong password \u2013 one that's not also used for anything else, especially any banking programs. As many blockades as your financial institutions put up against bad guys, nothing will stop them if someone yanks your username and password from the database of what you thought was a harmless thing that connects to the Internet.\u00a0If you're going to be connecting a lot of smart devices at home \u2013 TV, thermostat, baby monitor, garage door opener, these kinds of things \u2013 Irvine suggests setting up a separate network from those devices, one that works on Wi-Fi your computer never touches. He recommends a virtual private network (VPN) so that, if one of your new connected things gets infected with a virus, it won't bleed over onto your important devices to grab passwords and sensitive information.\u00a0Zulfikar Ramzan, CTO of RSA Securitysuggests thinking hard about what information you're willing to share with these devices, and how you'd feel if the device or the information it's collecting about you were made public. If you don't want that out there, then maybe anything tracking that kind of information isn't something you want in your life. Or at least maybe it\u2019s something you don\u2019t want connected to the Web.\u00a0For the CIOCIOs are between a rock and a hard place when it comes to all of these connected devices, Ramzan says.\u00a0"Every single one of these devices can be one or more entry points," he says. "It's one more way for the bad guy to do something and cause problems."\u00a0But turning into Chicken Little screaming that the sky is falling because someone syncs his Fitbit through his work laptop may be going a bit too far.\u00a0"We haven't seen a large-scale expectation of those risks," Ramzan says. CIOs, he says, "may perceive this to be something to worry about, but there may be nothing today to worry about."\u00a0How CIOs will balance the potential risks without being an alarmist is something that will shake out this year. But striking that right balance will be crucial going forward, especially since the potential exposure is huge....and there's no question that most IoT devices need better security.