window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Are Smartwatches Smart Enough?

Are Smartwatches Smart Enough?

Smartwatches might be great tools for keeping yourself connected to important information, but they bring with them a considerable amount of security threats. Vulnerabilities can make using smartwatches and other wearable technology dangerous. We’ll examine some of the major features of the modern smartwatch, how hackers can use them to cause trouble, and what you can do about it.

The Smartwatch
The smartwatch market as we know it today has existed for almost a decade, surprisingly enough, but the first smartwatch was developed in the late ‘90s. A smartwatch is seen today as more of a peripheral for a smartphone. They come in several different shapes, sizes, and styles, but they all tend to provide some kind of utility to the user. Here are some of the main benefits of using a smartwatch:

  • Convenience: You can’t beat the convenience of checking your watch and getting access to all kinds of information, like notifications, calendar events, and so much more. Modern smartwatches also give users the ability to search for information, and the processing power of these devices gives smartwatch users the ability to perform several actions that a smartphone can accomplish.
  • Functionality: The latest smartwatches have several features that give users lots of functionality. They can integrate with applications and take advantage of other practical functions, making them as useful as you want them to be. In this way, smartwatch manufacturers continue to push the boundaries of what’s possible with wearable technologies.
  • Discretion: Discretion is probably the most important part of using a smartwatch, as it’s much easier and more discreet to use it than pulling out a smartphone. Most smartphones have the capability to push notifications to your smartwatch, including those from social networks, messages, weather, and so on. More than anything else, it at least keeps you from being rude and checking your smartphone in the middle of a conversation.

Security Issues
The primary issue that comes from wearable technology is that it connects to your mobile device through a Bluetooth connection. Since they also connection to Wi-Fi networks, they are being exposed to two potential ways of being breached. Businesses that prioritize security (read: all businesses should prioritize security) need to be particularly wary of wearables, especially in regard to a Bring Your Own Device policy.

The modern hacker will use any opportunity they can find to hack into a device, and since wearables are particularly vulnerable to this due to the modes of connection they contain, they provide additional access points that create issues for businesses. If a hacker can gain access through an application at the wearable level, it could potentially compromise even the connected device and any network it’s attached to.

Industry experts might agree that the lack of wearable security isn’t a major concern overall, but it’s still something that you should be addressing with your business’ mobile device policy. Here are some ideas to think about:

  • If you are accidentally collecting electronic Protected Health Information (ePHI), you could be putting your organization at risk of breaching healthcare standards set by HIPAA. You should limit your employee’s fitness and wellness data collection on company-owned wearables and devices whenever possible.
  • Be wary of what can happen if you fail to educate your employees about the importance of protecting wearables. Be sure to remind them that they aren’t just putting business data at risk, but also their own individual data. It’s imperative that your employees understand how to best protect these devices.
  • Focus on the management of these devices, as there are no proper anti-malware solutions for IoT devices.

For assistance with planning out a wearable strategy for use with your Bring Your Own Device policy, be sure to reach out to us at 407-478-6600.

Top Cybersecurity Threats Right Now
Tip of the Week: Prepare for These Disaster Recove...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Managed IT Services Data Backup Hosted Solutions Hackers Malware Mobile Devices Data Recovery VoIP Email Data Google Outsourced IT User Tips Internet of Things Tech Term Innovation Communications Internet Microsoft Cloud Computing Backup Hardware IT Services Productivity Business Continuity Saving Money Efficiency Business Artificial Intelligence Software BDR Cybersecurity Smartphones Communication Small Business Ransomware Router Disaster Recovery Managed IT Services Cybercrime Android Smartphone IT Support Business Management Applications Windows 10 Chrome Workplace Tips Gadgets Browser Network IT Support Mobile Device Computer Phishing Law Enforcement Managed IT How To BYOD Access Control Holiday Blockchain Mobility Spam Data Security Mobile Device Management Collaboration Data Protection Windows Two-factor Authentication Avoiding Downtime Information Save Money Virtualization Computers Word Server Money Business Intelligence Encryption Office 365 Upgrade Telephone Systems Bandwidth Social Media Proactive IT Document Management Redundancy Social Engineering IT Management Analysis Wi-Fi Vulnerability Compliance Voice over Internet Protocol Remote Monitoring App Software as a Service Passwords Settings Facebook Training Firewall Apps Identity Theft Connectivity Productivity Managed Service Private Cloud Servers Machine Learning Automation Miscellaneous Alert Value Operating System Business Owner Fraud Telephone System Data loss Paperless Office Education Bring Your Own Device Smart Tech Mobile Computing Keyboard Google Docs Networking Health Human Resources Unified Threat Management Work/Life Balance Workers VPN Save Time Employer-Employee Relationship Infrastructure IT Plan Google Drive Windows 7 Healthcare Comparison OneNote Solid State Drive Telephony Flexibility Unsupported Software Scam Information Technology Password Data Storage Hacker File Sharing Microsoft Office Data Breach Business Technology CES Sports Budget Spam Blocking Credit Cards Big Data Update Website Virtual Assistant Botnet Content Management Flash Theft Thought Leadership Electronic Medical Records IT Consultant Remote Monitoring and Maintenance Remote Computing Data Warehousing WiFi Strategy YouTube Tip of the week Workforce Smartwatch Travel Warranty Managed Service Provider NIST Wireless FENG Social Data Management Mobile Recycling Cache E-Commerce Recovery End of Support Windows 10s Search Engine Amazon Google Apps Streaming Media Windows 10 Leadership Line of Business PDF Windows Server 2008 Telecommuting Authentication Employee Office Tips Screen Mirroring Students Netflix Printer Insurance Cryptocurrency Vendor Technology Tips Professional Services eWaste Wireless Internet Camera HBO SaaS Bing Sync Amazon Web Services Content Filter MSP HaaS Patch Management Remote Work Fiber-Optic Nanotechnology Augmented Reality Current Events Digital Signage Risk Management Cast Staff Cleaning Mouse Outlook Practices Safe Mode Wireless Technology Display Tools Criminal Wire Accountants HVAC Audit Help Desk Online Shopping Password Manager Storage webinar Remote Worker Multi-Factor Security Administrator Virtual Reality Hard Drives Regulations Cables The Internet of Things Knowledge Google Search Government Digital Signature Electronic Health Records Marketing Computer Care Frequently Asked Questions Specifications Hosted Computing Security Cameras Root Cause Analysis Emails Virtual Private Network Black Market Content Filtering Enterprise Content Management Shortcuts Hacking Skype Evernote Business Mangement Conferencing Wiring Instant Messaging Computing Infrastructure Software Tips Trending Samsung Microchip Worker Commute Unified Communications Devices Network Congestion Proactive HIPAA Excel Millennials Inventory Downtime Employee/Employer Relationship Legal Entertainment Meetings Smart Office Users Charger Project Management Battery Public Cloud IoT Password Management Computer Fan eCommerce Cortana Start Menu Wireless Charging Gmail Addiction GDPR USB Physical Security Lifestyle Mobile Office Utility Computing Benefits ISP User Error Hybrid Cloud Domains Best Practice IT solutions Public Computer Worker Troubleshooting Company Culture Loyalty Smart Technology Hiring/Firing Scalability Emergency Public Speaking Regulation Presentation Quick Tips Rootkit Shadow IT Hosted Solution Fun Internet exploMicrosoft Managing Stress Lithium-ion battery Employer Employee Relationship Experience Files 5G Content Office Tech Support Printers Advertising Safety IBM Computer Accessories Music Colocation Two Factor Authentication Politics History CrashOverride Audiobook Relocation Vendor Management Search Competition Assessment Twitter Customer Relationship Management Bluetooth Wearable Technology Transportation Net Neutrality Video Games Techology IP Address Humor Webinar Books Television Automobile Customer Service How to Internet Exlporer

Mobile? Grab this Article!

QR-Code dieser Seite