10 Ways Wearables Put Your Network in Serious Danger

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Ways Wearables Put Your Network in Serious Danger-7 Next

BYOD Policies

Many BYOD policies don’t include wearables yet. That means there is an inability to manage and monitor these devices in the same way an IT department would a smartphone, tablet or laptop. As Amit Sethi, senior principal consultant at Cigital pointed out, without having some sort of policy focused on wearables, IT teams may have no control over whether the user has any type of authentication or other security features enabled on the wearable device. Also, IT generally cannot wipe any sensitive data cached on the devices remotely if they are lost or stolen.

Wearable devices aren’t quite as ubiquitous as smartphones – at least not yet. IDC predicts that the wearables market is expected to grow at an annual rate of 45 percent between now and 2019. Fitness bands are the most popular wearables at the moment, but smart watches and other technologies are expected to increase over the next few years. We can expect wearables to play a large role in health care and sports training. Within the business setting, wearables can be used for authentication purposes or to assist in different hands-on or machine-based tasks, including interfacing with computers and other smart devices.

The growth of wearables, of course, means more devices connecting to the company network, increasing security risks. Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. But IT and security leaders need to be concerned, too. Sam Rehman, CTO of Arxan Technologies, stated:

Wearable devices may be putting many enterprise security professionals on their heels; they are the newest challenge in a BYOD workplace. These devices increase the attack surface and could become vulnerable targets that could allow unauthorized access to an enterprise's sensitive information. Defining tight enterprise security policies for the use of wearables and their access to corporate data is essential.

Let’s take a look at what security professionals think are the most serious weaknesses that wearable computing devices are introducing into networks.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.