Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 5 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Smart watches: don’t let your network become a fashion victim

by The Gurus
November 24, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

Smart watches: don’t let your network become a fashion victim

By Andrew Young, VP at Watchguard
The rapid development of mobile processors and internet bandwidth continues to significantly influence the way we work. Whilst employees use as many as three or four personal devices to tap into the corporate network from anywhere at any time, they often give little – if any – thought to the subsequent security implications which arise from granting network privileges to this proliferation of lifestyle wearables in the office.
IDG predicts that by 2019, an astonishing 89 million smart wearables including fitness and health trackers, smart glasses and ‘hearables’ will be transformed into every day working tools. This represents more than a doubling of today’s estimated 33 million devices.
Whilst commonly perceived as chic, lifestyle gadgets, wearables play host to thousands of productivity boosting apps that have migrated from the wider mobile market to offer “at a glance” messaging and email notifications, for example. But what appears to be a convenient way of fast-delivered information and easy-to-use tools can cause a huge headaches for unsuspecting IT departments.
All wearable technology devices are hyper-connected, enjoying Wi-Fi, Bluetooth and often direct cellular connectivity. Whilst the immediate result is an exponential rise in the attack surface of the corporate network, trouble can really ensue when pairing a wearable device with a smartphone.
When paired, tablet and mobile applications are automatically transferred to and installed on the wearables. In other words, a single wearable vulnerability could snowball into something far worse. Imagine inadvertently leaking your sales pipeline and customer information.
Given the popularity of the wearable devices among employees, it’s as hard to ban them from the office as this would essentially involve the disablement of all Wi-Fi and Bluetooth connectivity. Therefore, discussing wearable technologies in the work environment is on most enterprises’ agenda and is still being debated. Appealing benefits are:

  • Instant collaboration among the workforce
  • Authenticating the user for logical and physical log in and access
  • Information such as sales data, CRM, mail etc. can be accessed anywhere, at any time

Although corporate IT possesses the intelligence to prevent jail-broken smartphones from connecting to the network, it can’t guarantee a safe network as these measures fall short of securing the wearable technologies. Alongside this, other security concerns are:

  • Phishing attacks that can capture a smart watch PIN code and then access data on connected personal or corporate devices.
  • Malware attacking the device and siphon off company secrets and data to unauthorised devices.
  • Employees losing wearable devices that keep sensitive company data.

But gaining access to sensitive data is simpler than identifying a jail-broken device. Basic social engineering knowledge is enough given the simple access to wearables. To reduce a company’s security risk with wearables, employees should be taught best practices. The bare essentials include:

  • A set corporate policy around wearables in the company.
  • The requirement of non-trivial passcodes for devices linked to corporate data.
  • Stress the importance of reporting stolen or lost devices immediately.
  • Educating employees on how to identify and report spear phishing attacks.

Whilst it certainly might seem a lot to take on board in response to these otherwise benign devices, keep in mind the potential for these technologies to enable far more advanced security policies which include biometric authentication using heart rates and physical access through near-field communication with electronic doors.
Whether by security or productivity, wearable technology will be part of every connected company in the near future. As with every new technology, it’s always intriguing to embrace the new power and features of it. However, companies need to address the additional security threats wearables pose in their first adoption and how to prevent/combat them with security policies everybody can refer to.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Terror-alert spam targets the Middle East, Canada to spread malware

Next Post

The ticking time bomb: 40% of firms expect an insider data breach in the next 12 months

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information