Five Potential Security Concerns Related to Wearables

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Potential Security Concerns Related to Wearables-3 Next

Spy Gear for the Twenty-First Century

Secret agent technology popularized in television from the 1960s is becoming more of a reality as devices continue to permeate popular culture and modern business. Wearable devices allow users to easily and discreetly capture video and audio. As everyday items such as watches and eyeglasses are turned into wearable smart devices, it becomes difficult to curtail surveillance and protect information derived from the images collected. Wearables tend to be small and more discreet, which makes it easier than ever to steal data-sensitive information.

Solution: Video and audio captured by wearable devices should be controlled by policy, and regular checks and controls should be put in place to ensure enforcement of those policies. For example, companies can create an acceptable-use policy highlighting when and where wearable video / audio recording capabilities are allowed. This policy can be enforced by requiring both the employer and users to sign a written agreement, acknowledging that they have read and understand the policy. Enterprises can also require use of software applications to ensure that any captured video and images are stored in an encrypted secure container under IT control.

Five Potential Security Concerns Related to Wearables

The use of wearable technology is on the rise, spurred by the recent launch of the Apple Watch. Forward-thinking enterprises are looking to wearables as another opportunity for mobile technology to drive greater efficiency, enhance communication and improve workflow. The launch of enterprise-focused wearable apps, such as Salesforce and Zoho, is pushing the adoption of WYOD (wear your own device) within enterprise organizations. In fact, research shows that more than 200 million wearables will be in use by 2018.

As these devices grow in popularity, so do concerns over security. In fact, according to a 2014 report by Pricewaterhouse Coopers, 86 percent of respondents expressed concern for wearables increasing the risk of data security breaches. With enterprise-sensitive information now being transferred from wrist to wrist, businesses should prepare early and create security policies and procedures regarding the use of wearables within the enterprise.

In this slideshow, Accellion describes five potential security threats that enterprises need to consider and address related to WYOD.


Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

mobile92-290x195.jpg Why and How to Build an Enterprise App Store

Enterprise app stores provide a single "shopping experience" for employees and support both a BYOD model and a self-service IT model. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.