Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
BYOD Policies
Many BYOD policies don’t include wearables yet. That means there is an inability to manage and monitor these devices in the same way an IT department would a smartphone, tablet or laptop. As Amit Sethi, senior principal consultant at Cigital pointed out, without having some sort of policy focused on wearables, IT teams may have no control over whether the user has any type of authentication or other security features enabled on the wearable device. Also, IT generally cannot wipe any sensitive data cached on the devices remotely if they are lost or stolen.