Wearables At Work: 9 Security Steps Worth Taking - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Data Management // IoT
News
6/6/2016
07:06 AM
Lisa Morgan
Lisa Morgan
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Wearables At Work: 9 Security Steps Worth Taking

Wearables are finding their way into organizations, whether or not IT departments are prepared to deal with them. As the number of endpoints continues to grow, so does the potential for hacks. These nine pointers will help you prepare your organization to keep ahead of threats.
10 of 10

Be Forthcoming 
The question isn't whether a breach will happen, but when it will happen. Since it's impossible to know when an adversary will attack, it's wise to plan for the event in any case. A forensic examination can reveal what happened and how, although most organizations lack the resources they need to perform effective forensic work. From reputational and cultural perspectives it's imperative that employees and customers be notified about a breach in a timely manner and informed about what the company is doing to address it, even though the details of the breach may remain unknown for weeks or months.
'The biggest mistake companies make when something happens is to delay communication until they think they have the whole picture, thus reducing their user's or employee's ability to protect themselves because they're not aware of what's going on,' Jacob West said. 'The longer you wait to admit a problem, the more it appears you're trying to cover something up.' 
(Image: Unsplash via Pixabay)

Be Forthcoming

The question isn't whether a breach will happen, but when it will happen. Since it's impossible to know when an adversary will attack, it's wise to plan for the event in any case. A forensic examination can reveal what happened and how, although most organizations lack the resources they need to perform effective forensic work. From reputational and cultural perspectives it's imperative that employees and customers be notified about a breach in a timely manner and informed about what the company is doing to address it, even though the details of the breach may remain unknown for weeks or months.

"The biggest mistake companies make when something happens is to delay communication until they think they have the whole picture, thus reducing their user's or employee's ability to protect themselves because they're not aware of what's going on," Jacob West said. "The longer you wait to admit a problem, the more it appears you're trying to cover something up."

(Image: Unsplash via Pixabay)

10 of 10
Comment  | 
Print  | 
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll