The expert in the audio clip emphasized a key challenge for the expanding Internet of Things (IoT) ecosystem. What was identified as the most significant security vulnerability for IoT devices?
A) Their dependence on cloud computing for data storage.
B) The limited processing power of many individual IoT sensors.
C) The lack of standardized security protocols across different manufacturers.
D) High power consumption leading to frequent battery replacements.
E) The difficulty in updating firmware on legacy IoT devices.