IoT Security: What Kind of Data Is Compromised by Poorly Protected IoT Devices?