Wearables At Work: 9 Security Steps Worth Taking - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Data Management // IoT
News
6/6/2016
07:06 AM
Lisa Morgan
Lisa Morgan
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Wearables At Work: 9 Security Steps Worth Taking

Wearables are finding their way into organizations, whether or not IT departments are prepared to deal with them. As the number of endpoints continues to grow, so does the potential for hacks. These nine pointers will help you prepare your organization to keep ahead of threats.
6 of 10

Invest In Cyber Liability Insurance 
If your company doesn't already have cyber liability insurance, consider getting it now. The insurance helps insulate a company from the costs of a potential breach, which can be highly damaging -- if not fatal -- for some organizations. 
'Unless you've drawn up a contract between two organizations as an outsourced relationship, there's very little liability for providing insecure, broken software. Most companies eschew all liability through the license agreement,' said Jacob West of the IEEE Center for Secure Design. 'This is something that's going to get a lot of attention from the technical, legal, and insurance industries, because enterprises want to anticipate and redistribute the risk of cyberattacks, and an insurance model is the way we do that.'   
(Image: PublicDomainPictures via Pixabay)

Invest In Cyber Liability Insurance

If your company doesn't already have cyber liability insurance, consider getting it now. The insurance helps insulate a company from the costs of a potential breach, which can be highly damaging -- if not fatal -- for some organizations.

"Unless you've drawn up a contract between two organizations as an outsourced relationship, there's very little liability for providing insecure, broken software. Most companies eschew all liability through the license agreement," said Jacob West of the IEEE Center for Secure Design. "This is something that's going to get a lot of attention from the technical, legal, and insurance industries, because enterprises want to anticipate and redistribute the risk of cyberattacks, and an insurance model is the way we do that."

(Image: PublicDomainPictures via Pixabay)

6 of 10
Comment  | 
Print  | 
Commentary
Study Proposes 5 Primary Traits of Innovation Leaders
Joao-Pierre S. Ruth, Senior Writer,  11/8/2019
Slideshows
Top-Paying U.S. Cities for Data Scientists and Data Analysts
Cynthia Harvey, Freelance Journalist, InformationWeek,  11/5/2019
Slideshows
10 Strategic Technology Trends for 2020
Jessica Davis, Senior Editor, Enterprise Apps,  11/1/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll