dcsimg

Five Potential Security Concerns Related to Wearables

  • Five Potential Security Concerns Related to Wearables-

    You Don't Have to be a Hacker

    Not a day goes by without news of security breaches at the hands of hackers. The truth is that without built-in PIN protection or security fingerprinting, just about anyone can access the contents stored on a wearable. If a device is lost or misplaced, anyone potentially has access to the information, since wearables have the ability to store data locally without encryption, PIN protection or user-authentication features.

    Solution: Device manufacturers must take measures to strengthen user data protection. Privacy can be exponentially improved by enforcing security protections such as the requirement for unique and complex passwords, as well as the encryption of communications and data storage.

1 | 2 | 3 | 4 | 5 | 6 | 7

Five Potential Security Concerns Related to Wearables

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Five Potential Security Concerns Related to Wearables-2

    You Don't Have to be a Hacker

    Not a day goes by without news of security breaches at the hands of hackers. The truth is that without built-in PIN protection or security fingerprinting, just about anyone can access the contents stored on a wearable. If a device is lost or misplaced, anyone potentially has access to the information, since wearables have the ability to store data locally without encryption, PIN protection or user-authentication features.

    Solution: Device manufacturers must take measures to strengthen user data protection. Privacy can be exponentially improved by enforcing security protections such as the requirement for unique and complex passwords, as well as the encryption of communications and data storage.

Five Potential Security Concerns Related to Wearables

The use of wearable technology is on the rise, spurred by the recent launch of the Apple Watch. Forward-thinking enterprises are looking to wearables as another opportunity for mobile technology to drive greater efficiency, enhance communication and improve workflow. The launch of enterprise-focused wearable apps, such as Salesforce and Zoho, is pushing the adoption of WYOD (wear your own device) within enterprise organizations. In fact, research shows that more than 200 million wearables will be in use by 2018.

As these devices grow in popularity, so do concerns over security. In fact, according to a 2014 report by Pricewaterhouse Coopers, 86 percent of respondents expressed concern for wearables increasing the risk of data security breaches. With enterprise-sensitive information now being transferred from wrist to wrist, businesses should prepare early and create security policies and procedures regarding the use of wearables within the enterprise.

In this slideshow, Accellion describes five potential security threats that enterprises need to consider and address related to WYOD.