Wearables At Work: 9 Security Steps Worth Taking - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Data Management // IoT
News
6/6/2016
07:06 AM
Lisa Morgan
Lisa Morgan
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Wearables At Work: 9 Security Steps Worth Taking

Wearables are finding their way into organizations, whether or not IT departments are prepared to deal with them. As the number of endpoints continues to grow, so does the potential for hacks. These nine pointers will help you prepare your organization to keep ahead of threats.
2 of 10

Get Used To It 
As with the Bring Your Own Device (BYOD) smartphone trend, resistance to wearables in the workplace may prove futile. Regardless of how the devices find their way into your organization, you need prepare for the potential consequences of a breach. 
'The low-hanging fruit for the adversary is capturing data that is shared or very lightly protected, rather than targeting the vulnerability of the backend server,' Jacob West, founding member of the IEEE Center for Secure Design, said in an interview. 'It's easier to get at the data that the user shares inadvertently than steal it from the provider once it's been locked down.' 
(Image: skeeze via Pixabay)

Get Used To It

As with the Bring Your Own Device (BYOD) smartphone trend, resistance to wearables in the workplace may prove futile. Regardless of how the devices find their way into your organization, you need prepare for the potential consequences of a breach.

"The low-hanging fruit for the adversary is capturing data that is shared or very lightly protected, rather than targeting the vulnerability of the backend server," Jacob West, founding member of the IEEE Center for Secure Design, said in an interview. "It's easier to get at the data that the user shares inadvertently than steal it from the provider once it's been locked down."

(Image: skeeze via Pixabay)

2 of 10
Comment  | 
Print  | 
News
How GIS Data Can Help Fix Vaccine Distribution
Jessica Davis, Senior Editor, Enterprise Apps,  2/17/2021
Commentary
Graph-Based AI Enters the Enterprise Mainstream
James Kobielus, Tech Analyst, Consultant and Author,  2/16/2021
Slideshows
11 Ways DevOps Is Evolving
Lisa Morgan, Freelance Writer,  2/18/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Video
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Slideshows
Flash Poll