{"id":49164,"date":"2015-04-17T00:00:00","date_gmt":"2015-04-17T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/are-wearable-devices-a-threat-to-corporate-networks\/"},"modified":"2015-04-17T11:17:44","modified_gmt":"2015-04-17T11:17:44","slug":"are-wearable-devices-a-threat-to-corporate-networks","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/2\/31205\/trends\/are-wearable-devices-a-threat-to-corporate-networks","title":{"rendered":"Are Wearable Devices a Threat to Corporate Networks?"},"content":{"rendered":"
Wearables were one of 2014\u2019s defining tech trends, and will likely make the list again at the end of 2015. The Apple Watch<\/a> is the device everyone\u2019s focused on, but there are numerous other competitors. Microsoft has a new fitness band<\/a>. TAG Heuer is creating a smart watch<\/a>. Research firm IDC predicts that wearable shipments will reach 45.7 million<\/a> this year, an increase of over 230 percent from 2014. Everybody wants in.<\/p>\n But while consumers and tech journalists are waiting in anticipation of these devices, company IT departments are keeping a wary eye on them. One of the key questions for them is how these devices will impact the workplace. Are they harmless, or are they nearly invisible security threats waiting to bring down the network?<\/p>\n Businesses have been dealing with the influx of consumer products into the workplace since the spread of smartphones began in 2007. In some ways, wearable devices<\/a> are an extension of this trend. Fitness tracking devices, such as the Fitbit or Jawbone UP, are dependent on smartphones for pairing and offloading their data. Even more complex devices like the Apple Watch rely on a smartphone for any intensive processing tasks or for features like GPS navigation.<\/p>\n These devices do pose threats however, and companies can\u2019t rely on existing BYOD<\/a> policies to keep themselves secure.<\/p>\n Wearable devices communicate closely with smartphones, and may have indirect access to the networks that these phones connect to. Because current wearable devices lack the security features found in smartphones, this makes them the so-called "weak link" in your system. If a hacker can breach the security on a smart watch, it\u2019s possible they could gain access to your corporate network as well. Using multi-factor authentication for network access<\/a> is one way to guard against this.<\/p>\n The design of wearable devices can also undermine security. Most wearables have limited screen space (or none), and communicate through vibrations and taps. This allows consumers to easily pair their devices with their phones. It also makes it easy to trick users to into pairing their devices with unknown third parties. In a recent experiment<\/a>, a researcher from Kaspersky Lab found that numerous smart bands allowed third-party devices to connect with them, and in some cases extract data. Without a screen or clear way to identify what exactly is trying to pair with their smart band, users may simply tap their device to confirm its request, assuming it to be harmless. Educating employees on proper security protocol is the best way to prevent these type of attacks.<\/p>\n The good news for IT departments is that even if a hacker gains access to a wearable device, there often isn\u2019t much there. Most current devices collect only a handful of metrics, such as step counts or activity patterns. A lot of devices also offload their data to the cloud every few hours to free up additional space<\/a>. This means a hacker that goes to the work of tricking a user into pairing with a third-party device will likely only gain access to a few hours of step counts.<\/p>\nThe Weakest Link<\/span><\/h2>\n
The Upside to Limited Hardware<\/span><\/h2>\n