10 Ways Wearables Put Your Network in Serious Danger

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Ways Wearables Put Your Network in Serious Danger-5 Next

Vulnerable Apps

Especially important is the need for enterprises to only permit the use of wearable devices that have hardened application code and advanced key protection measures, said Sam Rehman, CTO of Arxan Technologies. This is critical in order to defend against reverse-engineering and tampering of an application's code. Without such protections, applications on the wearable devices could be easily manipulated to spy on the enterprise, steal sensitive corporate data, and do other nefarious things.

Wearable devices aren’t quite as ubiquitous as smartphones – at least not yet. IDC predicts that the wearables market is expected to grow at an annual rate of 45 percent between now and 2019. Fitness bands are the most popular wearables at the moment, but smart watches and other technologies are expected to increase over the next few years. We can expect wearables to play a large role in health care and sports training. Within the business setting, wearables can be used for authentication purposes or to assist in different hands-on or machine-based tasks, including interfacing with computers and other smart devices.

The growth of wearables, of course, means more devices connecting to the company network, increasing security risks. Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. But IT and security leaders need to be concerned, too. Sam Rehman, CTO of Arxan Technologies, stated:

Wearable devices may be putting many enterprise security professionals on their heels; they are the newest challenge in a BYOD workplace. These devices increase the attack surface and could become vulnerable targets that could allow unauthorized access to an enterprise's sensitive information. Defining tight enterprise security policies for the use of wearables and their access to corporate data is essential.

Let’s take a look at what security professionals think are the most serious weaknesses that wearable computing devices are introducing into networks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.