Browse Definitions :
Definition

wearables security

Contributor(s): Michael Cobb

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets, smart glasses and fitness trackers.

Wearable technology is a fast-growing trend both in and out of the workplace. However, the proliferation of wearable devices raises new concerns for businesses in regard to security, privacy and compliance. There are a number of risk factors common to wearables. Many wearable devices can store and transfer data, but they may not include PIN protection or user authentication features. As a rule, they also store data locally without encryption

Another problem is that wearable devices allow users to record video and audio unobtrusively. Whether the content is created innocently or maliciously, that data could, in the wrong hands, give away competitive intelligence (CI) . Furthermore, captured location data could provide an intruder with details about the user’s daily routines and current location at any given time.

Because of the special risks posed by wearable devices, experts recommend that businesses create separate WYOD (wear your own device) policies stipulating, among other things, which employees can bring wearables to the workplace, what types of devices are permissible and the circumstances under which they can and cannot be used.

This was last updated in October 2015

Continue Reading About wearables security

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Let's not forget Google Glass as well.. With so much technology available to purchase on line for the purpose of spying, I am amazed it is not being taken more seriously..Hacking devices to take control of the built in cameras for pictures or video is another issue. Unless you know your target well you may have to sift through an awful lot of data to get anything useful... Not a big ROI for the time so I think this type may be very small for most people. 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close