Blog
home
  • Register

Data Net Blog

Smartwatches Haven’t Become Much Smarter

Smartwatches Haven’t Become Much Smarter

The smartwatch has quite a few benefits, but anything that one might bring to the table is offset drastically by its position as a threat magnet. Vulnerabilities in smart watches and other wearable technology makes using these devices somewhat risky behavior. Today, we will look at some of the features of the modern smartwatch, how hackers are utilizing them to be disruptive, and what you need to do to protect yourself from the risk posed by hackers.

The Smartwatch
There has been an actual smartwatch market now for almost a decade, but the first smartwatch was actually developed in the late ‘90s. Today, the smartwatch is most frequently used as a peripheral to the smartphone. They come in all shapes and sizes, and for the most part, they tend to have some utility to the user. Some of the main benefits to using a smartwatch include:

  • Convenience - It is extraordinarily convenient to check your watch and get all the information that you need to get, like notifications, calendar events, and more. Today’s smartwatches even give you the ability to seek out information. Using a strong integration and its own processing power, today’s smartwatches do many of the things that the smartphone can do, from a screen the size of a watch face.
  • Functionality - Speaking of that functionality, the newest smartwatches have all types of features. From being able to integrate with some of your favorite apps, to practical functions that make them so useful, smartwatch manufacturers continue to push the envelope to what is possible for wearable technology.
  • Discretion - What is probably the most advantageous variable of the smartwatch, it provides the user the ability to be discreet about mobile interaction. Where most people will have their phone in their face a lot of the time, the ability for users to push notifications to their wearable, provides constant access to social networks, messaging, and practical information such as weather; and, since they are designed as a timepiece, it provides that function as well.

Security Concerns
The major drawback of wearable technology is how it connects with a user’s mobile device. Typically, the wearable connects via Bluetooth, it is just an extension of that devices functionality. One problem is that these devices also can connect to Wi-Fi networks. For businesses that want to run a tight ship, wearables present a strain on their BYOD policy. Since many of these devices don’t come with onboard security, they are immediately viewed as a vulnerability.

For the modern hacker, who looks for any vulnerability they can attack, wearables present an opportunity. Since network security best practices suggest that limiting access points is a great way to attempt to eliminate vulnerabilities, wearables are a problem. If a hacker gained access through an application at the wearable level, it could conceivably compromise the connected device and any network that device is connected to.

While industry experts agree that while a lack of wearable security isn’t a huge concern overall, it is something that should be addressed when rolling out an organization’s BYOD policy. There are some other concerns that include:

  • The unwitting collection of any electronic Protected Health Information (ePHI) could put an organization in the crosshairs of healthcare mandates such as HIPAA. You’ll want to limit access to employee fitness and wellness data if wearables are a concern for your organization.
  • A lack of education about the potential vulnerabilities' wearables present for not only a business’ data, but the user’s data. If you are going to allow wearables to access your networks, it’s important to educate your staff on the type of data their wearable devices collect, what it is used for, and where it ends up when it’s collected.
  • Since there are no real anti-malware solutions for IoT devices, the management of these devices need to be approached with care.

Wearables are useful devices that do have a future, but it is important to come up with a policy that protects the data your organization has on its network from potential threats. To learn more about how to roll out a comprehensive Bring Your Own Device policy, and protect your network against threats of all types, call Data Net’s IT professionals today at (760) 466-1200.

Breaking Down Collaboration’s Levels
Tip of the Week: Protect Your Word Document with a...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 08, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Data Productivity Privacy Malware Hackers Efficiency User Tips Microsoft Google Smartphones Innovation Communication Tech Term IT Support Email Managed IT Services Hardware Mobile Device Cybersecurity Computer Software Communications Internet Users VoIp Windows 10 Cloud Small Business Ransomware Workplace Tips Android Outsourced IT Business Management Cloud Computing IT Services Business Mobile Devices Collaboration Social Media Miscellaneous Browser Passwords Data Backup Network Information Wi-Fi Smartphone Applications Internet of Things Data recovery Hosted Solutions Facebook Apps Backup Managed IT services Bandwidth Patch Management Employer-Employee Relationship Windows Blockchain Gmail Wireless Upgrade Managed Service Chrome Microsoft Office Holiday Gadgets Laptop Managed IT Service VPN Value Saving Money BDR Phishing Business Intelligence Marketing Access Control Networking Compliance Save Money Word Office Virtual Assistant Batteries Virtualization Virus Paperless Office How To Employee-Employer Relationship RAM Remote Monitoring and Management Telephone System Office 365 Data Management Medical IT Data Protection Physical Security Quick Tips Settings Business Continuity Payment Cards Telephony Tech Terms Cost Management Connectivity Excel Social Network Company Culture Computers Scam Data Breach Automation Business Technology Voice over Internet Protocol Healthcare Going Green Apple Processor Net Neutrality Artificial Intelligence Cortana Password Data Security Router G Suite Wireless Charging Mobility Government Remote Computing eCommerce Education Taskbar Machine Learning Tactics Internet Explorer Proactive IT Processors Remote Monitoring Cryptocurrency Project Management Backup and Disaster Recovery Unified Communications Authentication Hard Disk Drive disposal Wireless Internet News Personal Information Downloads Dark Web Licensing Mobile Security Bring Your Own Device Update Training Benchmarks Staff Sports Reporting Law Enforcement Telecommuting Managed Services Provider IT Management Authorization Sales Online Shopping Live Streaming Help Desk National Security Threat User Tip Spyware Retail Windows 7 Search Hard Drives Video Server Management Amazon Content Filtering E-Commerce Bitcoin Analytics Trends Error Tech Support Operating System Hybrid Cloud Outlook Server Security Cameras Risk Management Digital Websites Electronic Health Records Vendor Microsoft Teams Tablet Telecommute Printing Remote Support Time Management Insurance SSD Alert Vulnerability Customer Service WannaCry Cleaning Payment A.I. User Security Cables Profitability Comparison Wearables Safety SaaS Workers Health Updates Data loss Paper Tip of the week Chrome OS File Management OneNote Database HIPAA instant Messaging Threats Big Data Technology Tips Movies Touchscreen Voice over IP Distribution Network Attached Storage Environment Eliminating Downtime Specifications Edge GDPR File Sharing Millennials Employees Managing Stress Knowledge Battery Congratulations Certification HP Spam Ink Current Events IT budget Twitter Travel Windows Server 2008 R2 Cybercrime Maintenance Plug-In Hard Drive Botnet Vulnerabilities Scams Microsoft Office 365 Solid State Drive Fleet Management e-waste BYOD Conferencing Lead Generation Recycling Dongle Streaming Media Storage iPhone Troubleshooting WhatsApp Display Document Management Antivirus PowerPoint Website Human Resources Mobile Office Inventory WiFi Analysis Financial Disaster Recovery Thank You Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123