Browse Definitions :
Definition

wearables security

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets, smart glasses and fitness trackers.

Wearable technology is a fast-growing trend both in and out of the workplace. However, the proliferation of wearable devices raises new concerns for businesses in regard to security, privacy and compliance. There are a number of risk factors common to wearables. Many wearable devices can store and transfer data, but they may not include PIN protection or user authentication features. As a rule, they also store data locally without encryption

Another problem is that wearable devices allow users to record video and audio unobtrusively. Whether the content is created innocently or maliciously, that data could, in the wrong hands, give away competitive intelligence (CI) . Furthermore, captured location data could provide an intruder with details about the user’s daily routines and current location at any given time.

Because of the special risks posed by wearable devices, experts recommend that businesses create separate WYOD (wear your own device) policies stipulating, among other things, which employees can bring wearables to the workplace, what types of devices are permissible and the circumstances under which they can and cannot be used.

This was last updated in October 2015

Continue Reading About wearables security

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close