Wearables At Work: 9 Security Steps Worth Taking - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Data Management // IoT
News
6/6/2016
07:06 AM
Lisa Morgan
Lisa Morgan
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Wearables At Work: 9 Security Steps Worth Taking

Wearables are finding their way into organizations, whether or not IT departments are prepared to deal with them. As the number of endpoints continues to grow, so does the potential for hacks. These nine pointers will help you prepare your organization to keep ahead of threats.
5 of 10

Typical Design Flaws Apply 
Wearable device designs are not immune to design flaws. In the race to get to market with the coolest device security holes can be overlooked. The oversight can put a business and its employees at risk. 
'A lot of mistakes you can make when building a software system are not specific to the type of software you're building,' said Jacob West, founding member of the IEEE Center for Secure Design. 'As people become more mature about how they treat [the] data, and become more educated about the types of data collected, we'll see more adversarial attacks, which we're seeing for more traditional systems.' 
The prpl Foundation, a nonprofit open source foundation, has peer-reviewed guidelines designed to improve the security of embedded device designs. The guidelines include topics such as addressing fundamental controls for securing devices, using a Security by Separation approach, and enforcing secure development and testing. 
(Image: geralt via Pixabay)

Typical Design Flaws Apply

Wearable device designs are not immune to design flaws. In the race to get to market with the coolest device security holes can be overlooked. The oversight can put a business and its employees at risk.

"A lot of mistakes you can make when building a software system are not specific to the type of software you're building," said Jacob West, founding member of the IEEE Center for Secure Design. "As people become more mature about how they treat [the] data, and become more educated about the types of data collected, we'll see more adversarial attacks, which we're seeing for more traditional systems."

The prpl Foundation, a nonprofit open source foundation, has peer-reviewed guidelines designed to improve the security of embedded device designs. The guidelines include topics such as addressing fundamental controls for securing devices, using a Security by Separation approach, and enforcing secure development and testing.

(Image: geralt via Pixabay)

5 of 10
Comment  | 
Print  | 
Commentary
What Becomes of CFOs During Digital Transformation?
Joao-Pierre S. Ruth, Senior Writer,  2/4/2020
News
Fighting the Coronavirus with Analytics and GIS
Jessica Davis, Senior Editor, Enterprise Apps,  2/3/2020
Slideshows
IT Careers: 10 Job Skills in High Demand This Year
Cynthia Harvey, Freelance Journalist, InformationWeek,  2/3/2020
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Slideshows
Flash Poll