dcsimg

Five Potential Security Concerns Related to Wearables

  • Five Potential Security Concerns Related to Wearables

    Five Potential Security Concerns Related to Wearables-

    An Open Window of Opportunity for the Persistent

    Bluetooth and Wi-Fi communication between wearable devices and paired smartphones is another area of vulnerability for enterprise data. Recently, security firm BitDefender demonstrated that the Bluetooth communication between Android devices and smartphones could be deciphered using brute-force attacks. Rather than focusing in on software vulnerabilities, hackers opt for persistent trial and error, trying username and password combinations until they crack the code and are able to access contents stored on devices.

    Solution: Businesses should consider restricting wearable device capabilities that pose the most risk, including disabling certain features and restricting where in the organization wearable technology will be allowed or prohibited.

1 | 2 | 3 | 4 | 5 | 6 | 7

Five Potential Security Concerns Related to Wearables

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Five Potential Security Concerns Related to Wearables-4

    An Open Window of Opportunity for the Persistent

    Bluetooth and Wi-Fi communication between wearable devices and paired smartphones is another area of vulnerability for enterprise data. Recently, security firm BitDefender demonstrated that the Bluetooth communication between Android devices and smartphones could be deciphered using brute-force attacks. Rather than focusing in on software vulnerabilities, hackers opt for persistent trial and error, trying username and password combinations until they crack the code and are able to access contents stored on devices.

    Solution: Businesses should consider restricting wearable device capabilities that pose the most risk, including disabling certain features and restricting where in the organization wearable technology will be allowed or prohibited.

Five Potential Security Concerns Related to Wearables

The use of wearable technology is on the rise, spurred by the recent launch of the Apple Watch. Forward-thinking enterprises are looking to wearables as another opportunity for mobile technology to drive greater efficiency, enhance communication and improve workflow. The launch of enterprise-focused wearable apps, such as Salesforce and Zoho, is pushing the adoption of WYOD (wear your own device) within enterprise organizations. In fact, research shows that more than 200 million wearables will be in use by 2018.

As these devices grow in popularity, so do concerns over security. In fact, according to a 2014 report by Pricewaterhouse Coopers, 86 percent of respondents expressed concern for wearables increasing the risk of data security breaches. With enterprise-sensitive information now being transferred from wrist to wrist, businesses should prepare early and create security policies and procedures regarding the use of wearables within the enterprise.

In this slideshow, Accellion describes five potential security threats that enterprises need to consider and address related to WYOD.