In the past several years, organisations have had to adjust to new consumer technologies entering the work place. Bring your own device security policies and protocols have undergone extensive development, as more and more employees use their personal smart phones, tablets, and laptops to facilitate their work. Now, a new generation of personal devices have begun to enter the workplace: wearable tech.
Wearable devices, including smart watches, eye glasses, etc. are gaining in popularity and becoming an important part of the technological ecosystem. Of course, these devices and other devices that make use of internet connectivity and collect, store, and share data, can also represent new cyber security challenges for your organisation.
Managing the risks associated with wearable tech
Some organisations have simply banned the use of wearables in the work place, but this is not likely to remain a viable long term strategy in most industries. Technology, mobility, and connectivity are shaping our personal and professional lives more every day. Instead of ignoring wearables, companies should be taking the initiative to begin to develop risk management policies and protocols in a proactive manner.
If IT and cyber security teams begin drafting policies that can evolve alongside the wearable tech revolution, they can help to shape their company’s security outlook. Those that opt not to do this may find themselves scrambling to create band-aid policies in a reactionary manner—rarely a strong strategy for ensuring solid cyber security.
A good place to start is the company’s existing BYOD policy. Often, the BYOD policy can be updated to incorporate these new devices. Many of the security solutions that have already proven to be useful with other devices can be tailored to provide additional security in terms of wearable device use as well. For example: the ability to remote wipe a missing device, mobile device management and mobile application management solutions, and real-time tracking of devices connected to the workplace network.
Consider the security solutions wearables may offer
Wearable technology isn’t just a potential vulnerability. These new devices may also help in the development of additional security solutions. Additional two-factor authentication protocol, for example, could be a natural next step: location based authentication, user pulse-based identification, and other unique applications may prove valuable from a security perspective.
Technological innovation, greater mobility, and improved connectivity are always going to present new security challenges—a great security strategy is one that is constantly evolving to meet them.