Browse Definitions :
Definition

wearables security

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets, smart glasses and fitness trackers.

Wearable technology is a fast-growing trend both in and out of the workplace. However, the proliferation of wearable devices raises new concerns for businesses in regard to security, privacy and compliance. There are a number of risk factors common to wearables. Many wearable devices can store and transfer data, but they may not include PIN protection or user authentication features. As a rule, they also store data locally without encryption

Another problem is that wearable devices allow users to record video and audio unobtrusively. Whether the content is created innocently or maliciously, that data could, in the wrong hands, give away competitive intelligence (CI) . Furthermore, captured location data could provide an intruder with details about the user’s daily routines and current location at any given time.

Because of the special risks posed by wearable devices, experts recommend that businesses create separate WYOD (wear your own device) policies stipulating, among other things, which employees can bring wearables to the workplace, what types of devices are permissible and the circumstances under which they can and cannot be used.

This was last updated in October 2015

Continue Reading About wearables security

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close