3 Tips for Securing Wearable Technology In the Work PlaceWearables will open new possibilities for effeciency and cyber vulnerability. It's not too early to get policies in place.

ByNicko van Someren

Opinions expressed by Entrepreneur contributors are their own.

Jawbone via Facebook
Jawbone fitness tracker.

Wearables are coming into the enterprise whether we are prepared for it or not. This new consumer trend is frequently making headlines with the emergence of fitness bands and smartwatches, Google Glass and even rings on our fingers.

是有道理的:技术已经成为不可或缺part of our lives. Not only can these devices act as a natural extension of the smartphones we already use regularly, but they also are designed to provide and collect information in more natural ways.

Just as with BYOD, the emergence of wearable technology is bringing with it new security threats and vulnerabilities. Each one of these connected devices represents a potential access point for hackers to obtain sensitive data. In my opinion, wearables are likely going to suffer the worst security problems amongst the Internet of Things (IoT), as they contain the most personal data.

Below are tips to ensure sensitive personal and corporate data accessed and stored on wearable technology is kept secure in the emerging era of BYOW, or bring your own wearable:

1. Don't take data for granted.

Smartphones, tablets, wearables and other connected devices are collecting a host of extra information that can put consumers and corporations at risk. GPS logs, for example, can track where you work, where you pick up your kids from school, which ATMs you stopped at and which medical clinics you visited.

Identity thieves and blackmailers who wish to gain insight into your company's info, your bank account and your medical records can hack your wearable devices to find this valuable information. Furthermore, tracking information in a wearable device isn't just useful to stalkers. It could also be used by competitors to alert them to which clients, vendors, partners and investors you're meeting with. Recognizing that all data has value is the first step in ensuring it remains in safe hands.

Related:As Wearables Get Hot, These 6 Industries Are Poised to Capitalize

2. Choose substance over style.

The dominant mobile operating systems of today have become much more user friendly over the past few years. Apple, Google and Microsoft have all delivered world-class mobile user experiences that provide more power and freedom than ever before, pushing the "Security vs. Usability" trade-off to the forefront of IT conversations. Meanwhile, many enterprises struggle to keep up with this innovative and powerful extension of the worker outside of the office.

On the flip side, users are beginning to recognize that a great user interface is not the only requirement -- security and privacy have become just as integral.In a 2014 study, American multinational corporation Fortinet found that 70 percent of its respondents are "extremely concerned" or "somewhat concerned" about data breaches or having sensitive personal data compromised.

The first wave of wearables was not designed for the enterprise, making this consumer technology a significant threat to business security.

第二波,我们现在看到的是更多sophisticated and of more benefit to enterprise workers for productive mobility. Hopefully, this means they will have more robust security features built in, but in all likelihood they will have even more access to sensitive data without a comparable increase in security. In order to keep corporate information safe, companies must protect the most appropriate assets while allowing the end users to access the functionality provided by the manufacturers.

Related:Seeing the Future of Wearables in the Workplace

3. Use a containerized approach.

Mobile operating systems are leaky by design because they make data easy to move from one app to another, one device to another and one user to another. This ease-of-use has profound implications in terms of security because using something that's incredibly easy to set up and use means there is very little control over the data replication. For enterprises, this can create a security problem if employees bring unsecured devices in the workplace for work purposes.

Keeping enterprise data in separate, encrypted containers on smart devices has made it possible to control where the data goes next. Policies can be put into place that control the flow of alerts to paired wearable devices as well as controlling the flow of data between apps.

For example, an IT department can allow email subject lines or meeting reminders to get sent to a smartwatch but not allow full access to emails or Office documents on the smartwatch.

To secure any mobile technology, enterprises need to adopt a containerized approach where corporate data is separated from personal data and secured.According to Gartner, smartwatches will make up 40 percent of consumer wristworn devices by 2016. While just a year ago only two of the top 10 smartphone vendors were in the wearable space, today nine out of the 10 top smartphone vendors have entered the market.

Wearable technology is on the rise, and just as we saw with BYOD, employees will continue to bring wearable devices to work to increase efficiency. Many enterprises are just now planning and implementing their overall mobile strategies and policies to ensure the security of corporate data, and wearables must be a part of that discussion.

Related:Feeling Frazzled? This Wearable Gadget Can Help Keep Your Stress in Check.

Wavy Line
Nicko van Someren

CTO, Good Technology

At Good Technology, Nicko Van is in charge of future technology strategy and research. Van has extensive experience in the security industry. Prior to joining Good Technology, he served as chief security architect at Juniper Networks, responsible for leading the technology and design direction for the company's network security products, as well as promoting Juniper's security solutions to industry and government sectors. Before joining Juniper, Van was founder and CTO of the security technology company nCipher Plc., where he led the research team and directed the technical development.

Editor's Pick

Related Topics

Business News

An 81-Year-Old Florida CEO Just Indicted for a $250 Million Ponzi Scheme Ran a Sprawling Senior Citizen Crime Ring

Carl Ruderman is the fifth senior citizen in the Miami-Fort-Lauderdale-Palm Beach metropolitan area to face charges in connection with the scam.

Business News

'Soul Crushing': Internet Sleuths Notice Something Is Very Off With This Condo Listing

From the grey carpets to the fluorescent lights, it's obvious that this home was not always a home.

Business News

'Awful Advice': Barbara Corcoran Slammed For 'Tone Deaf' Business Advice to Interns

The "Shark Tank" star shared tips on social media about how interns can increase their chances of getting hired full-time, but the public reaction didn't go as planned.

Growing a Business

Borekas Founder Uzi Wizman on Creating a Food Business from Social Media

Interview with Uzi Wizman, founder of Borekas and PSY Street Kitchen, about growing a brand from an Instagram Story and sharing culture with the world.

领导

6 Ways to Become a Better Listener

Listening is one of the most foundational and critical skills in building relationships at home and at work. It's not always easy to listen well, but with practice, we can all improve our skills. Here's six ways you can start.