10 Ways Wearables Put Your Network in Serious Danger

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Next

Limited UI

The limited user interfaces on these devices make it challenging to add security features to apps running on them. Sethi posed this question: If you are developing an enterprise app for a wearable device and want to authenticate the user before allowing him/her to do something sensitive, how do you do that without the authentication step becoming a nuisance? Usability generally wins over security. Adding security features to apps running on wearable devices may make using the app more difficult for the user than simply pulling out their smartphones.

Wearable devices aren’t quite as ubiquitous as smartphones – at least not yet. IDC predicts that the wearables market is expected to grow at an annual rate of 45 percent between now and 2019. Fitness bands are the most popular wearables at the moment, but smart watches and other technologies are expected to increase over the next few years. We can expect wearables to play a large role in health care and sports training. Within the business setting, wearables can be used for authentication purposes or to assist in different hands-on or machine-based tasks, including interfacing with computers and other smart devices.

The growth of wearables, of course, means more devices connecting to the company network, increasing security risks. Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. But IT and security leaders need to be concerned, too. Sam Rehman, CTO of Arxan Technologies, stated:

Wearable devices may be putting many enterprise security professionals on their heels; they are the newest challenge in a BYOD workplace. These devices increase the attack surface and could become vulnerable targets that could allow unauthorized access to an enterprise's sensitive information. Defining tight enterprise security policies for the use of wearables and their access to corporate data is essential.

Let’s take a look at what security professionals think are the most serious weaknesses that wearable computing devices are introducing into networks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.