IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Wearables at work: Are smartwatches secure enough for the office?

Wearable technology poses a threat in the workplace – how can IT departments deal with them?

smartwatch

Following Mobile World Congress and with Apple Watch set to launch in April, wearable technology has once again taken centre stage.

From a security perspective, we have not seen any deliberate attacks aimed at smartwatch devices thus far, probably because the adoption of these devices has not yet reached the critical mass necessary to pique the interest of cybercriminals. However, this does not mean that they won’t try in the near future.

The wearable dilemma: what are the security concerns?

There are many potential risks that wearable technology could pose within an enterprise environment. Firstly, hackers could use poorly configured smart gadgets as backdoors into a corporate network. This is down to the fact that they are currently lacking the proper security mechanisms. Rather worryingly, the expected fast-paced and widespread adoption of these devices is likely to leave little time for implementing security standards on a global scale.

Secondly, most wearables can be charged via USB. Imagine what would happen if a user were to have his home laptop infected and somehow got his wearable to piggyback a Trojan onto his work laptop. USB vulnerabilities have been exploited by attackers for a long time, and it stands to reason that wearables or anything Internet of Things (IoT) related will be used to spread malware in the future.

There is little IT administrators can do to prevent these types of attacks, other than disabling access to USB-enabled peripherals. Another solution would be to ban wearable technology in the workplace, but we don’t believe that is really an option. In light of this, IT departments must set up new standards and protocols to manage the plethora of wearables and smart devices ready to connect to enterprise Wi-Fi networks.

Wearables at work: what are the challenges?

For businesses and IT departments looking to implement wearable devices, security and privacy challenges will of course be encountered. The connected world of IoT devices is already beginning to drive changes in the industry and new regulations and security frameworks will have to account for current IT limitations on network architectures.

An obstacle businesses are already facing is the inability to store, access and interpret the data in time due to its volume and speed. In order to counteract this issue, firms should consider a redesign in the architecture of data infrastructures as well as a more comprehensive strategy for storage.

Wearable devices should be regarded as mobile devices, but with ultimate portability and the potential to affect businesses in a way no other gadgets ever have. For example, imagine employees walking around the office with Google Glasses on and attending meetings or reading important documents. This type of technology would access some of the most well-kept company secrets, and with serious consequences if an attacker were to gain access to it.

Google Glass has probably taught us a thing or two about wearables and privacy, too. Some countries already have laws and regulations regarding surveillance and data protection meant to protect individual rights; for example, the UK has both the Data Protection Act and CCTV Code of Practice to refer to when considering Google Glass.

We strongly advise that companies enforce some guidelines or regulations regarding the use of wearable technologies, to include banning wearables capable of audio or video recording during conference calls. Unquestionably, as the wearable revolution grows in popularity, IT departments will have their hands full trying to keep up with the latest gadgets and advancements.

Wearable Technology: A Quick Guide

Alexandru Catalin Cosoi is chief security strategist at Bitdefender

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Recommended

OGL Software will remain an independent business following the sales of sister divisions
mergers and acquisitions

OGL Software will remain an independent business following the sales of sister divisions

17 Aug 2022
N-able unveils Cloud User Hub for Microsoft 365
cloud management

N-able unveils Cloud User Hub for Microsoft 365

17 Aug 2022
Large-scale data breaches are in decline but hacking remains a threat - Flashpoint
data breaches

Large-scale data breaches are in decline but hacking remains a threat - Flashpoint

16 Aug 2022
Gartner: Software businesses must adopt DevSecOps before it becomes mainstream
Software

Gartner: Software businesses must adopt DevSecOps before it becomes mainstream

16 Aug 2022

Most Popular

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs
zero-day exploit

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs

18 Aug 2022
Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
The benefits of a hardware update for SMBs
Sponsored

The benefits of a hardware update for SMBs

2 Aug 2022