Browse Definitions :
Definition

wearables security

Contributor(s): Michael Cobb

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets, smart glasses and fitness trackers.

Wearable technology is a fast-growing trend both in and out of the workplace. However, the proliferation of wearable devices raises new concerns for businesses in regard to security, privacy and compliance. There are a number of risk factors common to wearables. Many wearable devices can store and transfer data, but they may not include PIN protection or user authentication features. As a rule, they also store data locally without encryption

Another problem is that wearable devices allow users to record video and audio unobtrusively. Whether the content is created innocently or maliciously, that data could, in the wrong hands, give away competitive intelligence (CI) . Furthermore, captured location data could provide an intruder with details about the user’s daily routines and current location at any given time.

Because of the special risks posed by wearable devices, experts recommend that businesses create separate WYOD (wear your own device) policies stipulating, among other things, which employees can bring wearables to the workplace, what types of devices are permissible and the circumstances under which they can and cannot be used.

This was last updated in October 2015

Continue Reading About wearables security

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Let's not forget Google Glass as well.. With so much technology available to purchase on line for the purpose of spying, I am amazed it is not being taken more seriously..Hacking devices to take control of the built in cameras for pictures or video is another issue. Unless you know your target well you may have to sift through an awful lot of data to get anything useful... Not a big ROI for the time so I think this type may be very small for most people. 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close