Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
Limited UI
The limited user interfaces on these devices make it challenging to add security features to apps running on them. Sethi posed this question: If you are developing an enterprise app for a wearable device and want to authenticate the user before allowing him/her to do something sensitive, how do you do that without the authentication step becoming a nuisance? Usability generally wins over security. Adding security features to apps running on wearable devices may make using the app more difficult for the user than simply pulling out their smartphones.
The limited user interfaces on these devices make it challenging to add security features to apps running on them. Sethi posed this question: If you are developing an enterprise app for a wearable device and want to authenticate the user before allowing him/her to do something sensitive, how do you do that without the authentication step becoming a nuisance? Usability generally wins over security. Adding security features to apps running on wearable devices may make using the app more difficult for the user than simply pulling out their smartphones.
Wearable devices may be putting many enterprise security professionals on their heels; they are the newest challenge in a BYOD workplace. These devices increase the attack surface and could become vulnerable targets that could allow unauthorized access to an enterprise's sensitive information. Defining tight enterprise security policies for the use of wearables and their access to corporate data is essential.
Let’s take a look at what security professionals think are the most serious weaknesses that wearable computing devices are introducing into networks.