Browse Definitions :
Definition

wearables security

Contributor(s): Michael Cobb

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets, smart glasses and fitness trackers.

Wearable technology is a fast-growing trend both in and out of the workplace. However, the proliferation of wearable devices raises new concerns for businesses in regard to security, privacy and compliance. There are a number of risk factors common to wearables. Many wearable devices can store and transfer data, but they may not include PIN protection or user authentication features. As a rule, they also store data locally without encryption

Another problem is that wearable devices allow users to record video and audio unobtrusively. Whether the content is created innocently or maliciously, that data could, in the wrong hands, give away competitive intelligence (CI) . Furthermore, captured location data could provide an intruder with details about the user’s daily routines and current location at any given time.

Because of the special risks posed by wearable devices, experts recommend that businesses create separate WYOD (wear your own device) policies stipulating, among other things, which employees can bring wearables to the workplace, what types of devices are permissible and the circumstances under which they can and cannot be used.

This was last updated in October 2015

Continue Reading About wearables security

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Let's not forget Google Glass as well.. With so much technology available to purchase on line for the purpose of spying, I am amazed it is not being taken more seriously..Hacking devices to take control of the built in cameras for pictures or video is another issue. Unless you know your target well you may have to sift through an awful lot of data to get anything useful... Not a big ROI for the time so I think this type may be very small for most people. 
Cancel

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close