Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
Network Connections
Wearable devices will generally need to be connected to a smartphone, tablet or computer. So they will be plugged into a corporate laptop or desktop through a USB port, as your phone is today, and thus could introduce viruses or malware into the company's system. This is a backdoor to the company's network via an employee's wrist or headwear, according to security professionals at INSIDE Secure. This gives hackers the chance to download private corporate information, remotely control the wearable, or allow unauthorized access into physical locations.