Five Potential Security Concerns Related to Wearables

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Potential Security Concerns Related to Wearables-4 Next

An Open Window of Opportunity for the Persistent

Bluetooth and Wi-Fi communication between wearable devices and paired smartphones is another area of vulnerability for enterprise data. Recently, security firm BitDefender demonstrated that the Bluetooth communication between Android devices and smartphones could be deciphered using brute-force attacks. Rather than focusing in on software vulnerabilities, hackers opt for persistent trial and error, trying username and password combinations until they crack the code and are able to access contents stored on devices.

Solution: Businesses should consider restricting wearable device capabilities that pose the most risk, including disabling certain features and restricting where in the organization wearable technology will be allowed or prohibited.

Five Potential Security Concerns Related to Wearables

The use of wearable technology is on the rise, spurred by the recent launch of the Apple Watch. Forward-thinking enterprises are looking to wearables as another opportunity for mobile technology to drive greater efficiency, enhance communication and improve workflow. The launch of enterprise-focused wearable apps, such as Salesforce and Zoho, is pushing the adoption of WYOD (wear your own device) within enterprise organizations. In fact, research shows that more than 200 million wearables will be in use by 2018.

As these devices grow in popularity, so do concerns over security. In fact, according to a 2014 report by Pricewaterhouse Coopers, 86 percent of respondents expressed concern for wearables increasing the risk of data security breaches. With enterprise-sensitive information now being transferred from wrist to wrist, businesses should prepare early and create security policies and procedures regarding the use of wearables within the enterprise.

In this slideshow, Accellion describes five potential security threats that enterprises need to consider and address related to WYOD.

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.