Securing the Connected World: How to Minimize the IoT Attack Surface