Users of wearables are already voicing concern that hackers want to steal the data generated and transmitted. IT and security leaders need to be concerned, too.
Limited Platform Protections
Wearable devices generally have small batteries, limited memory, and several other constraints, Sethi stated. Whenever we have a constrained environment, we see a lack of platform protections that could be costly in terms of resource usage, and weak and proprietary cryptographic protocols because the strong standard protocols are too slow, etc. Data being handled by the wearable devices is often at risk as a result – both when it is in transit between a smartphone and the wearable device, and when it is cached on the wearable device.